US7587749B2 - Computer method and apparatus for managing data objects in a distributed context - Google Patents
Computer method and apparatus for managing data objects in a distributed context Download PDFInfo
- Publication number
- US7587749B2 US7587749B2 US10/856,112 US85611204A US7587749B2 US 7587749 B2 US7587749 B2 US 7587749B2 US 85611204 A US85611204 A US 85611204A US 7587749 B2 US7587749 B2 US 7587749B2
- Authority
- US
- United States
- Prior art keywords
- content
- policy
- control
- control policy
- maintaining
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Definitions
- the present invention relates to the field of usage rights enforcement and management for digitally encoded documents and data.
- This approach typically relies on encryption technology to guarantee that only authorized users have access to the actual data object.
- authorized users are given access to the secret key needed to decrypt the protected object and produce the actual data object.
- the usage rights typically specify who is authorized to access the secret key and what an authorized user can do with the decrypted data object.
- This basic approach includes the large body of work in digital rights management (DRM) and related rights management technologies. Though this approach does not prevent copying of the encrypted bits, it achieves the same end result as copy protection since unauthorized users cannot access the protected data objects without the secret key.
- DRM digital rights management
- a rights management system must tightly couple the usage rights to the encrypted data objects so that the usage rights always appear with the associated object. This coupling should make it very difficult and ideally impossible for someone, who is not the owner of the object or otherwise authorized, to separate the data object from its usage rights.
- the first category comprises attacks on the combination of the usage rights and encrypted data object. Replacing the usage rights of one file with the usage rights of another is an example of an attack in this category.
- the second category comprises attacks undertaken while the data object is decrypted and being used by an authorized user. The goal here is to obtain an unprotected copy of the decrypted data object by directly circumventing the usage rights.
- a rights management system must contain mechanisms that protect against both categories of attack.
- the second category of attacks highlights the fact that the encrypted data object must eventually be decrypted in order to be accessed by an authorized user.
- a rights management system may either allow the user to decrypt the data object directly, or it may require the deployment and use of rights-management-aware applications.
- the owner of the protected data object may not want to bother the end user with an explicit encryption and decryption step or may not trust the end user to abide by the usage rights.
- the preferred method is to employ rights-management-aware applications that transparently decrypt the data objects for authorized users and enforce the usage rules attached to the objects.
- Rights-management-aware applications act as trusted agents for the rights management system, enforcing the rules specified by the owners of the protected data objects.
- Media players that can play music files in encrypted formats are examples of rights-management-aware applications.
- rights-management-aware applications allows a rights management system to enforce a tight coupling between an encrypted data object and its associated usage rights.
- Some designers have chosen to implement this tight coupling by storing the usage rights together with the encrypted data object, producing a new data object that is often referred to as a secure container (e.g., see U.S. Pat. No. 6,427,140).
- usage rights are explicitly tied to a particular copy of the protected data object. This approach works well, for example, in commercial markets like online music where the owner of the data object publishes read-only content and simply wants to maintain control over the usage and distribution of the content.
- We refer to such rights management systems as supporting publish-only distribution models.
- a key characteristic of the publish-only distribution model is that the usage rights in the secure container are not expected to change over time. Or if they do change, they change slowly, and the change affects only one end user at a time.
- the owner To change the usage rights in the publish-only distribution model, the owner must have access to the secure container holding the usage rights. Access to the secure container would enable the rights management system to modify the usage rights stored in the container. If the secure container was not available, the owner can remove the end user's authorization to access the original secure container (e.g., by destroying the decryption key for this container) and re-issue a new secure container to the end user with the same protected data object but new usage rights. This latter approach requires the rights management system to notify the end user of the new secure container, and it requires that the rights management system has a copy of the data object to put into the new secure container.
- Authentica has patented a partial solution to the enforcement and management of usage rights for digital data objects in dynamic and distributed environments (U.S. Pat. No. 6,449,721).
- This approach allows the owner of a digital data object to maintain control over the usage rights even after the protected objects have been distributed to end users.
- the approach stores the usage rights of protected objects in a single, central location so that an owner of a protected data object can change the usage rights of that object without requiring simultaneous access to any of the (possibly numerous) copies of the data object.
- this approach allows multiple, distributed copies of the data object to exist while maintaining only a single, authoritative copy of the object's usage rights. Having a single, authoritative copy of the object's usage rights simplifies management of the usage rights.
- Authentica's approach creates a unique identifier for each segment of protected information.
- the Authentica key server maintains an association between unique segment identifiers, the usage rights for those segments, and the encryption keys used to protect and access each segment.
- an end user To access a protected segment, an end user must authenticate to the server and provide the identifier of the protected segment he or she wishes to access. Assuming that the user is authorized to access the protected segment, the server responds with a decryption key for that segment and the usage rights for that segment and user combination.
- a rights-management-aware application on the end-user's machine uses the server's response to provide the end user with the owner-designated level of access to the protected segment.
- aspects of the invention include a method and a system for maintaining and managing control over data objects authored, accessed, and altered by users in dynamic, distributed, and collaborative contexts.
- a data object is any audio, graphical, video, or written work encoded in digital form and encapsulated in a computer structure, such as a file, message, or shared memory object, that a software program can access and manipulate.
- a distributed and collaborative context is one in which groups of one or more users work individually or collaboratively on collections of one or more data objects on a network of computers with at least intermittent connectivity to achieve some common purpose.
- this common purpose we refer to this common purpose as a business process.
- the present invention considers a context to be dynamic if properties of the system can change during the lifetime of a business process.
- the system might allow the set of users belonging to a role to change during a business process, or it might allow the type of control imposed on a data object to change.
- the invention separates the publication and modification of protected data objects from the ownership and manipulation of the policies controlling the usage of those data objects.
- Control over a data object is specified by a set of rules describing how software programs run by a computer user in a particular role may access and manipulate the object.
- rules describing how software programs run by a computer user in a particular role may access and manipulate the object.
- Control policies are signed assertions that describe the conditions under which usage rights are authorized.
- a control policy comprises at least a list of users who may access the data object, the privileges of those users with access, and an additional list of users who may define or edit the control policy.
- Policies in the present invention may also define supplemental properties that apply to the objects under its control, to assure authenticity, integrity, and confidentiality of those objects.
- control typically implies protection against access by unauthorized users and their applications.
- a further objective of the present invention is to provide a system and method for obtaining visibility into a business process. Such visibility may be achieved without committing to the risks of securing data objects by encrypting or otherwise changing the actual digital representation of their data objects.
- control does not include protection, we obviously cannot ensure that we maintain control against malicious adversaries, i.e. ones that manipulate the protected data objects outside of our protected environment.
- this level of control is still desirable in business situations where an enterprise might want visibility into a business process while their data objects remain in plain text.
- a further objective of the present invention is to provide a method and system for storing control policies on one or more central servers.
- a further objective of the present invention is to provide a method and system for editing control policies, based on an indication of the users that may edit the control policies and the types of changes that those users can perform. Changes to a control policy would be enacted on the server storing that control policy.
- a further objective of the present invention is to provide a method and system for temporarily changing one or more control policies and then reverting back automatically to the original settings at some point in the future.
- a further objective of the present invention is to provide a method and system for having one or more preset temporary changes that can be enacted by the click of one button and then rolled back on the click of another button.
- a further objective of the present invention is to provide a method and system for attaching to each data object an identification of one (i.e., a respective) control policy.
- a control policy whose identification is attached to a data object as the control policy protecting that data object.
- a data object a protected data object.
- a further objective of the present invention is to allow multiple data objects to reference the same control policy.
- a further objective of the present invention is to provide a method and system wherein the identification of a control policy specifies the server in whose name space the actual control policy identifier is defined.
- the policy reference attached to a data object comprises a server URL and a numerical value known to that server.
- a further objective of the present invention is to provide a method and system for checking by a client connected possibly intermittently to a policy server that a user attempting to create, access, or alter a data object protected by a control policy has the right to perform that action on that data object. If the user has the right, the client allows the requested action to proceed. If the user does not have the right, the client responds with an appropriate error message.
- the protection provided by the business process approach does not just protect proprietary, confidential, or otherwise sensitive data objects while they're stored on disk or transmitted over a communication link, but it also protects them while they are operated on by the software applications of authorized users and during inter-application communication (e.g., clipboard operations in the Microsoft Windows operating system).
- a further objective of the present invention is to provide a method and system with control policies that may contain conditions that specify device, location, time-of-access, or network connectivity constraints.
- a further objective of the present invention is to provide a method and system wherein users authorized to edit a control policy can change that policy without physical or electronic access to all data objects protected by the policy.
- a further objective of the present invention is to provide a method and system allowing the only authoritative copy (or copies) of a protected data object to be located on computing machines or media of users without the rights to change the control policy protecting the data object.
- a further objective of the present invention is to provide a method and system for allowing authorized users to create new protected data objects even when the client that they are working on has lost connectivity with the server of the specified control policy.
- Authorized users in this circumstance are those users that have the right to create data objects under the control policy.
- the user must have had some recent access to the policy server, where “recent” means within the cache timeout period as specified for that policy.
- a further objective of the present invention is to provide a method and system for two or more authorized users to view protected data objects and work collaboratively on new and existing protected data objects even when one or more of these users' clients may have lost connectivity with the server (or servers) of the control policies protecting the collaborative data objects.
- the protected data objects may never have been viewed while connected to the server (or servers).
- the shared data objects may be new, that is, created while the users did not have connectivity with the server.
- a further objective of the present invention is to provide a method and system in which the storage of the policy server scales in proportion to the number of control policies defined.
- the storage should not scale in proportion to the number of unique protected data objects nor with the number of copies of these protected data objects.
- a further objective of the present invention is to provide a method and system for grouping control policies into business processes.
- a further objective of the present invention is to provide a method and system for constructing a control policy by identifying one or more roles involved in that control policy.
- Each role comprises a respective set of usage rights and a list of users.
- a further objective of the present invention is to provide a method and system for aggregating the usage rights of a user appearing in multiple roles contained in a single control policy.
- a further objective of the present invention is to provide a method and system for differentiating between users with the privilege to administer (create, edit, and delete) business processes and their encompassing control policies from those users with the privilege to modify only the list of users in one or more roles of a control policy.
- a further objective of the present invention is to provide a method and system in which the identification of a control policy on a data object can change. This change might cause the data object to be no longer managed by the system.
- a further objective of the present invention is to provide a method and system allowing users with appropriate usage rights to change the control policy identifications on data objects.
- a user may be granted the right to unprotect data objects by changing the objects control policy identifier to “unmanaged” or equivalent status.
- a further objective of the present invention is to provide a method and system with control policies that further define a list of users who may transfer data objects out of the control policy and a separate list of users who may assign the policy to data objects. Both of these actions involve changing the control policy identifier attached to a data object. There may be times when these lists contain no users.
- a further objective of the present invention is to provide a method and system for automating the transfer of data objects between control policies for those users with the privilege to do the transfer and assign manually.
- the preferred embodiment of this aspect involves integrating a tool into the software component of an existing electronic business process.
- a further objective of the present invention is to provide a method and system for allowing the administrators of business processes to determine the events that cause the automatic transfer of data objects between control policies.
- a further objective of the present invention is to provide a method and system for organizing business processes in a hierarchical manner. Such a hierarchy may be used to limit the scope of transfers of data objects between control policies. It may also be used to define control policies or other properties that are common to several business processes in a single location.
- a further objective of the present invention is to provide a method and system (e.g., graphical user interface) for displaying and changing the control policy of a protected data object.
- this is implemented as a drop-down window located in the title bar of the window displaying the data object.
- This drop-down window is referred to as the droplet control.
- a window may open up with several policies and options for selection by the user.
- a further objective of the present invention is to provide a method and system for displaying the list of possible control policies that a user can transfer the current data object to when the user activates the droplet control.
- a further objective of the present invention is to provide a method and system for changing a data object's control policy when a user selects a new control policy in the activated droplet control window of the data object.
- a further objective of the present invention is to provide a method and system for illustrating the hierarchy of control policies within business processes within an activated droplet control window.
- a further objective of the present invention is to provide a method and system for encrypting data objects with a content encryption key (CEK), which is then encrypted with a key encryption key (KEK) of the control policy associated with the data object.
- CEK content encryption key
- KEK key encryption key
- a further objective of the present invention is to provide a method and system for indicating whether the data objects protected by a control policy should be treated as ephemeral or permanent objects.
- An ephemeral data object is accessible until some designated future time; after that time, the object becomes inaccessible and unrecoverable.
- a permanent data object is always accessible or recoverable when presented to the rights management system or its agents.
- a further objective of the present invention is to provide a method and system for forcing all data objects protected by a control policy to become inaccessible and unrecoverable before the designated future time.
- the business process's administrator can permanently revoke access earlier than planned.
- a further objective of the present invention is to provide a method and system for recording the control policy identifier in a data structure stored with the (possibly encrypted) bits of the protected data object.
- this data structure we refer to this data structure as the Control Policy Tag (CPT).
- CPT Control Policy Tag
- a further objective of the present invention is to provide a method and system for attaching the CPT to the beginning or end of the protected data object.
- a further objective of the present invention is to provide a method and system for constructing the CPT of a protected data object on either a client or a server machine.
- a further objective of the present invention is to provide a method and system for storing the CEK safely in the CPT.
- the client can access protected data objects off-line with only cached policy and key (KEK) information because the CPT contains the CEK.
- KEK policy and key
- a further objective of the present invention is to provide a method and system for automatically replacing an expired CPT on a protected data object. Expiration of a CPT may occur because the CPT format has changed or the control policy KEK for the CPT has expired (i.e., gone beyond its validity period).
- a further objective of the present invention is to provide a method and system where the trustworthy clients of the rights management system do not need code to interpret old CPT formats.
- a further objective of the present invention is to provide a method and system for indicating that a control policy protects data objects that are read-only or stored on read-only computer media.
- a further objective of the present invention is to provide a method and system for informing an unauthorized user of the system protecting the data object accessed.
- the preferred embodiment includes a text message in the CPT.
- a further objective of the present invention is to provide a method and system for protecting the integrity of the CPT against tampering.
- the preferred embodiment uses a secure hash over the CPT fields.
- a further objective of the present invention is to provide a method and system for protecting the confidentiality of a data object's CEK while stored in the CPT.
- the preferred embodiment encrypts the CEK with the control policy's KEK.
- the encrypted CEK is protected against known plaintext attacks (i.e. attacks based on the knowledge of identical pieces of two similar documents) by using random seed values and changing the CEK whenever the data object is changed.
- a further objective of the present invention is to provide a method and system for protecting the server and client communication against network-based attacks.
- the preferred embodiment uses a Hypertext Transfer Protocol over Secure Socket Layer (HTTPS) connection for communications between the client and server.
- HTTPS Hypertext Transfer Protocol over Secure Socket Layer
- a further objective of the present invention is to provide a method and system for enabling an audit or forensic analysis of a business process based on activities granted and denied within one or more of the control policies of that business process.
- a further objective of the present invention is to provide a method and system for identifying the data objects in an activity log based on unique document identifiers maintained in the CPT.
- a further objective of the present invention is to provide a method and system for allowing the client to access the server at user login time to obtain and cache the control policies in which the user is mentioned. This feature addresses issues arising in collaborative and distributed environments, including intermittent connectivity, off-line usage of protected data objects, and off-line collaboration with others mentioned in the control policy.
- a further objective of the present invention is to provide a method and system for varying the polling frequency at which clients verify cached policies with the server.
- the frequency may be set so that the client must always verify the cache policy before permitting access.
- a further objective of the present invention is to provide a method and system for having clients verify and refresh cached policies when network access is restored.
- a further objective of the present invention is to provide a method and system for the server to prompt clients to refresh their cached policies.
- a further objective of the present invention is to provide a method and system for specifying the expiration time of a cached control policy.
- a further objective of the present invention is to provide a method and system for specifying the validity period of the KEK of a control policy.
- a further objective of the present invention is to provide a method and system for allowing the server to supply a client with a limited history of KEKs for a control policy.
- the use of an expired policy KEK in a protected data object does not force the client to have to contact the server before accessing the object. Even though a user never accesses a protected data object while online, as long as his or her off-line access occurs within the cache timeout period of the control policy of the data object, the user will not be denied access due to an out-of-date KEK.
- FIG. 1 is a schematic diagram of an organization structure for rights management policies
- FIGS. 2-5 are illustrations of various applications of business processes and control policies
- FIG. 6 is an architectural block diagram of main components of one embodiment of the invention.
- FIG. 7 is a flow diagram describing logic of policy administration
- FIG. 8 is a schematic illustration of a control policy tag
- FIG. 9 is a flow diagram of accessing a protected data object
- FIG. 10 is an architectural block diagram of the client agent in another embodiment of the present invention.
- FIG. 11 is a flow diagram of client handler processing
- FIG. 12 is an illustration of key encryption, key distribution and expiry
- FIG. 13 is a second flow diagram of accessing a protected data object
- FIG. 14 is a third flow diagram of accessing a protected data object
- FIG. 15 is an illustration of control policy display
- FIG. 16 is a flow diagram of policy transfer logic
- FIG. 17 is a flow diagram of off-line collaboration between two users.
- FIG. 1 illustrates the organizing structure 10 for policies employed in one embodiment of the present invention.
- a business process 12 represents progressively continuing procedures based on controlled phases or activities that are systematically directed at achieving specific business results.
- Business processes 12 within the hierarchical organizing structure 10 act as containers that hold one or more control policies 14 .
- a control policy 14 specifies usage rules that govern how the protected data objects may be used and by whom. Policies typically represent the phases or activities within a business process and are flexible enough to support data classifications (e.g. company confidential, executive only, etc.).
- Each protected data object (illustrated as a document) is associated with and under the control of a single control policy 14 within a business process 12 .
- Each control policy 14 specifies one or more roles 16 .
- a role 16 describes the set of users (or groups) and their privileges on the data managed by a policy 14 .
- the following embodiment of the present invention will allow an organization to retain control of usage and flow of its data objects in a manner that separates rights management actions from physical access to the copies of data objects.
- the invention and its preferred embodiments guarantee that changes to the control policy will be propagated to end users and ultimately experienced by those users when they next access the data objects protected by that changed policy. This guarantee holds even though access by the owner of the protected data objects to any or all copies of those objects may be impractical or impossible at the time of the change.
- the preferred embodiments will illustrate how the present invention supports the transparent use of protected data objects in a dynamic, distributed, and collaborative environment, where multiple users are modifying individual copies of protected data objects on diverse computer devices and storage media, some of which may not be online or otherwise accessible to the owner of the protected data objects.
- the discussion will clearly show that the invention supports the distinction between an information author and owner. It will also illustrate that the invention includes protections against adversaries that would try to attack the association between policies and data objects.
- FIGS. 2-5 enumerate hypothetical steps in such a dynamic, distributed, and collaborative process.
- the “NASD 2711” business process 150 comprises three control policies 14 : “Background Research” 152 ( FIG. 2 ); “Industry Review” 154 ( FIGS. 3 and 4 ); and “Publish” 156 ( FIG. 5 ).
- the “VP Compliance” owns the business process and administers all aspects of it.
- For the “Background Research” policy 152 in FIG. 2 she creates two roles: “Analyst” and “Director”. Each person listed in the “Analyst” role is able to create, read, and write reports within the “Background Research” policy. Each person listed in the “Director” role can read (but not write) the report and transfer a copy of such reports to the “Industry Review” policy 154 .
- FIG. 2 describes the creation of an analyst report for “Big Motor Co.”, which is protected and controlled by the “NASD 2711” business process 150 .
- analysts can draft and collaborate on reports (a data object) in this policy 152 , and when they have completed a report, they can forward it to the “Director of Research”, who is a member of the “Director” role, for review and ultimately transfer to compliance.
- Individuals not listed in one of the roles under the “Background Research” policy 152 are unable to access the reports protected by this policy.
- FIG. 3 describes the first part of the dynamic “Industry Review” piece 154 of this business process 150 .
- “Industry Review” comprises a policy with three roles: the “Director” role can read protected data objects in this policy 154 and transfer data objects into the policy 154 ; the “Compliance” role can read the protected data objects, transfer copies of data objects to the “Publish” policy 156 ( FIG. 5 ), and administer membership in the “External Reviewer” role; and the “External Reviewer” role can edit the protected data objects.
- the “VP Compliance” When the “VP Compliance”, who is a member of the “Compliance” role, receives a protected data object from the “Director of Research”, who is a member of the “Director” role of the “Industry Review” policy 154 , the “VP Compliance” edits the membership of the “External Reviewer” role to allow the “BMCo CFO” and the “Automotive I-Banker” to review and edit the protected analyst report. When the members of the “External Reviewer” role are done with their collaborative interaction, they will send the updated data object back to the “VP Compliance”.
- the “VP Compliance” can now remove the “BMCo CFO” and the “Automotive I-Banker” from the membership of the “External Reviewer” role (and thus from the “Industry Review” policy 154 ) so that they are no longer able to view reports (subject data object) protected under the “Industry Review” policy, as illustrated in FIG. 4 .
- Such removal illustrates one aspect of the dynamic nature of the present invention.
- FIG. 5 completes the progression of the analyst report through the phases of a Big Motor Co. analyst review constrained by the “NASD 2711” business process 150 .
- FIG. 5 illustrates the three roles within the “Publish” policy 156 , all of which can read but not write the protected data objects.
- the “Compliance” role can transfer data objects into the policy 156
- the “Director” role can administer membership in the “Reader” role.
- the “Director of Research” in the “Director” role adds the necessary parties (e.g., the sales group and the BMCo CFO) to the “Reader” role and makes the protected analyst report available to the outside world.
- FIG. 6 illustrates the main architectural components of an embodiment of the present invention and the primary interactions between these architectural components.
- a user 20 uses a rights-management-aware application 21 to operate on a protected data object 32 .
- the protected data object 32 comprises an encrypted data object 22 and a tag 23 .
- the data object 32 may not be encrypted.
- the reference monitor 24 in the client agent 26 intercepts operation requests on the data of the protected data object 32 by the rights-management-aware application 21 .
- This monitor uses the tag 23 on the protected data object 32 to obtain the usage rights in the policy protecting this data object 22 for the user 20 .
- the client agent 26 may have to communicate with the policy manager 27 on the policy server 29 to obtain the details of the control policy identified by the tag 23 .
- the crypto engine 25 in the client agent 26 will perform the appropriate encryption operation for the requested operation on the data object 22 .
- the encryption key required to perform this operation was originally obtained from the key manager 28 on the policy server 29 as part of control policy request and reply actions.
- control policies stored on the policy server 29 may be created and edited by an appropriately authorized user 30 using a policy administration application 31 , which interacts with the policy manager 27 on the policy server 29 .
- a particular embodiment may use multiple policy servers. Multiple servers may be used for the purpose of improved reliability or load balancing.
- the client agent 26 may have only intermittent connectivity with the policy server 29 .
- the invention supports the propagation of modified usage rights to the copies of the effected data objects in a timely manner, the definition of “timely” is set by the users 30 authorized to manage policies. For example, in some commercial situations, timely might mean that all accesses to a data object after modification of its usage rights would be governed by the new rights. In other situations where the commercial environment calls for limited “off-line” access to protected data objects, timely might mean that the usage rights are updated once the local agent for the rights management system comes back online.
- the client application 21 in FIG. 6 is described as a rights-management-aware application that cooperates with the client agent 26 of the rights management system to enforce the policies stored on the policy server 29 .
- There exist numerous methods for creating such a rights-management-aware application We might code the application 21 to interact directly with the client agent 26 . Alternatively, we might code an application 21 to load and use a set of rights management libraries with standard interfaces. We would then implement a version of these rights management libraries that would manage all interactions with the client agent 26 . Finally, the system on which the application 21 runs might inject the client agent 26 into applications to create rights-management-aware applications, as described in U.S.
- client-centric processing based on reference monitoring enables applications to become trusted agents of the rights management system and thus provide for local enforcement of the specified usage rights, even when the client machines are disconnected from the rest of the rights management system.
- Embodiments employing dynamic injection enable existing as well as new applications to become immediate participants in the rights management system.
- a control policy 14 comprises at least a list of the users authorized to access the data objects protected by that policy, a digest of the privileges granted to each user in the authorization list, a current Key Encryption Key (KEK), and a unique identifier (i.e., the Policy ID used in tags 23 ).
- Control policies 14 may also contain conditions on those privileges; these conditions may specify additional device, location, time-of-access, or network-connectivity constraints.
- the present invention differentiates between the set of users 20 authorized to access data objects protected by a policy (mentioned above) and the set of users 30 to administer (i.e. create, edit, and delete) control policies and the encompassing business processes. Notice that a user might be a member of both sets of users 20 , 30 .
- IT administrators are those users that have administrative access to the policy server 29 in FIG. 6 . Their task is to maintain the computing infrastructure required by the policy server; the IT administrators are not needed to perform the business-related administrative aspects of policy management.
- a business process owner is a user with the right to administer a specified business process.
- a business process owner may edit all aspects of the control policies 14 within the owned business process, but he or she cannot modify other business processes (unless the user is also the business process owner of those other business processes as well).
- a business role administrator is a user that may modify the user lists within the roles of a specified control policy 14 .
- a business role administrator has a subset of the privileges granted to the business process owner of the business process in which the business role administrator is named.
- one preferred embodiment supports the organizing of defined business processes in a hierarchical manner. For example, consider a collection of business processes that are organized as a tree. The business process at the root of the tree represents the topmost context, and the business processes at the leaves of the tree are the individual components of the business process at the root. Additional interior tree nodes may be used to represent major categories within the overall business process.
- Such a hierarchy organized as a tree may be used to indicate the user or users that are able to administer all of the business processes within a subtree of the hierarchy. Similarly, the indicated users might be able to administer only the roles within that subtree.
- FIG. 7 describes the logic of the policy administration application 31 in FIG. 6 .
- the process begins in step 40 with a user starting the policy administration application 31 and connecting to a policy server 29 .
- the policy administration application 31 is a J2EE web application.
- the system verifies that the user is an authorized administrator, identifies the type of administrator that the user is, and determines the types of operations that the user can perform on the policy database. If the user is not authorized to perform any actions or even view the database, an error message is displayed in Step 42 .
- Step 43 presents a view of the business processes, their control policies, and associated roles that the authorized user can administer; the view depends upon the rights of the authorized user. Step 43 then waits for the user to select an action that modifies the database of business processes.
- An authorized user may choose to create or edit a business process, control policy 14 , or role list, as illustrated in step 44 . All changes performed by the user are logged and committed in step 46 . The changes are then displayed to the user in Step 43 .
- Step 43 By logging the changes, the system may allow authorized users to undo an earlier change to the database on the policy server 29 .
- Step 43 also allows the user to rollback a set of committed changes, as illustrated in step 45 .
- This action is also logged and committed in step 46 .
- Steps 43 through 46 are repeated until the user exits the policy administration application 31 . All of these steps can occur without any access to or knowledge of the exact data objects protected by the changed business processes and policies on the policy server 29 .
- One preferred embodiment of the invention uses the rollback feature mentioned above to implement a one-click security setting that can be enabled or disabled in a dynamic manner. We colloquially call the one-click security setting the security knob.
- a key aspect of this feature is that an enterprise or business process owner may want to enter this “lock-down” security state quickly and only for a temporary time period. Once the threat or vulnerability has passed, the system should revert to the policy characteristics defined for the “normal” security state. It would be too slow, error-prone, and tedious to edit each of the pieces of a business process every time the enterprise or business process owner wanted to enter or exit the “lock-down” security state.
- one embodiment would create a set of log events that would automatically be applied when the security knob was set to a pre-defined setting.
- the log events for the “lock-down” security state described above could be captured by simply having the authorized administrator perform the changes to the current business process (i.e. “normal” security state), having the system log and store those changes under the appropriate security setting identifier (i.e., “lock-down”), and not having those changes actually applied to the database at the time of definition.
- the log events for the transition from “lock-down” to “normal” are simply those used to revert from the “lock-down” change.
- the system would ask the user if he or she also wanted to change, for example, the “lock-down” security state while the authorized user was making changes to the business process under the “normal” security state.
- GUID globally unique identifier
- FIG. 8 is an abstract representation of the control policy tag 23 of the protected data object 32 in FIG. 6 .
- the CPT contains the content encryption key (CEK) used to encrypt the data object 22 .
- CEK content encryption key
- the CPT is also the mechanism by which policies in the rights management system are associated with data objects.
- the combination of an encrypted (or encryptable) data object 22 and its CPT is called a protected data object 32 .
- the rights management system For each data object 22 , the rights management system generates a pseudo-random number that it uses as a symmetric key for encrypting and decrypting the data object 22 . This process effectively produces a unique CEK for each data object.
- the control policy tag 23 in FIG. 8 is a data structure with fields that provide identity information, encryption information, and integrity information. Though the fields may appear in any order, a client agent 26 must always be able to find and interpret the CPT version 51 and length 52 fields.
- the version field 51 identifies the version of the CPT structure being used. This field allows the system designers to change the format or contents of the CPT in the future and yet still be able to access content protected by old as well as new CPT structures (see FIG. 14 and its associated explanation below).
- the version field 51 may begin with a “magic number” that content filtering applications can use to identify the data object 32 as one encrypted and protected under the current invention.
- This “magic number” could, for example, be used by anti-virus scanning applications to know that the protected data object 32 is encrypted (and presumably free of viruses due to a scan before encryption).
- the length field 52 specifies the size of the CPT in bytes.
- the text message field 53 is an optional field that explains to an unauthorized user (or users executing programs not under control of the rights management system) that the attached data object 32 is protected and where to go to get more information. This field is optional; some deployments may choose greater secrecy (no information provided to unauthorized users) over ease-of-use concerns (informing users how they can become part of the rights management system).
- the control policy id field 54 identifies the control policy 14 that protects the attached data object. This field contains a globally unique identifier (GUID). The control policy id field 54 may also specify (e.g., via a URL) the policy server 29 in whose name space the GUID is known.
- GUID globally unique identifier
- the object id field 55 is another optional field; it specifies a unique identifier for each data object 22 .
- Each protected data object 32 is encrypted with a secret key, called the Content Encryption Key (CEK), and this key is stored in at least two places in the CPT structure 23 , labeled Encrypted CEK 56 and 57 .
- CEK Content Encryption Key
- One of these two fields 56 , 57 contains the CEK encrypted with the policy server's KEK.
- the other field contains the CEK encrypted with the Key Encryption Key (KEK) of the policy identified in the control policy id field 54 .
- the KEKs may be either symmetric or asymmetric keys. For the rest of the description of the preferred embodiment, we will assume that a KEK comprises a public/private key pair.
- Another embodiment may include additional KEK fields that support role-based KEKs. In this manner, an administrator could specify unique key properties (e.g., shorter off-line access) for certain roles.
- the encryption algorithm id field 58 identifies the actual algorithm and other definable properties (e.g., key length) used to encrypt the data object with the CEK.
- the final field, the integrity check field 59 is used to ensure that no one has tampered with the fields in the CPT 23 . It may contain, for example, a secure hash of the entire CPT.
- the two encrypted CEK fields 56 and 57 and the encryption algorithm id field 58 are zeroed.
- Control policies 14 are considered an integral part of a protected data object 32 , accompanying the data object even as it moves among computers and their internal structures (e.g., file systems and memory buffers).
- the CPT which references the governing control policy through the control policy id field 54 and contains the CEK secured by the control policy's KEK, is propagated with the encrypted data object 22 until explicitly removed by an authorized user through an embodiment of the rights management system of the present invention.
- An explicit decision of the present invention is to allow multiple data objects 32 to refer to and be protected by a single control policy 14 .
- the CPT structure described above clearly supports this decision.
- the embodiment also emphasizes the fact that the value in the control policy id field 54 of the CPT does not uniquely identify a document (as a unique document identifier would do).
- the policy server 29 of FIG. 6 stores only the details of control policies 14 and not the association between data objects 32 and control policies 14 .
- the association between data objects and control policies is stored only in the CPT 23 of the protected data objects 32 .
- This design implies that the storage of the policy server 29 dedicated to policies 14 scales in proportion to the number of control policies 14 defined.
- the storage of the policy server is not affected by the number of unique protected data objects 32 . It is also not affected by the number of copies of these protected data objects.
- the preferred embodiment of the present invention has the CPT 23 located in front of the data object 32 (i.e. the CPT is encountered before the data object when scanning a protected data object 32 starting with the first byte of the protected data object).
- a different embodiment could place the CPT at the end or at any other explicit location within the protected data object 32 .
- the preferred embodiment allows both the policy server 29 and the client agent 26 of FIG. 6 to construct CPTs 23 .
- FIG. 9 describes the logic followed by the reference monitor 24 of FIG. 6 on an operation that accesses a protected data object 32 .
- the reference monitor 24 in step 61 first determines if the operation accesses a protected data object 32 . This check involves looking for a CPT 23 on the data object. If no CPT exists, the reference monitor 24 allows the application 21 to continue at step 62 . If a CPT 23 exists, the monitor 24 in step 63 checks the CPT's version field 51 and determines if the version of the CPT is the current version. If it is not, the reference monitor proceeds to step 64 , which is explained in FIG. 14 .
- the monitor in step 65 proceeds to check the integrity of the CPT via field 59 ( FIG. 8 ). If the CPT has been tampered with, the monitor 24 displays an error message in step 66 ; otherwise, in step 67 it uses the control policy id (field 54 , FIG. 8 ) in the CPT along with the user's authentication credentials to determine the user's usage rights for this protected data object 32 . Given a set of usage rights, the monitor in step 68 determines if the user is authorized to perform the requested operation. If not, the monitor 24 in step 69 inhibits the application 21 from performing the requested operation and displays an appropriate error message.
- the control policy id field 54 , FIG. 8
- the preferred embodiment aggregates the usage rights for each of the roles containing the user. This aggregation yields a set of usage rights that contains all of the positive rights of that user's individual roles.
- another embodiment might use a different aggregation method.
- the monitor 24 in step 70 uses the KEK of the control policy 14 identified in the CPT to decrypt the CEK used to encrypt and decrypt the contents of the subject protected data object 32 .
- the sections on CPT update and disaster recovery below describe some exceptional conditions that may occur during the processing of step 70 in some embodiments.
- the monitor 24 in step 72 uses the CEK to either decrypt the encrypted contents on a read operation or encrypt new contents on a write operation.
- FIG. 10 illustrates the details of the preferred embodiment of the client architecture of the present invention.
- This embodiment splits the client agent 26 of FIG. 6 into a client handler process 82 and an integration bundle 84 .
- the integration bundle 84 could be implemented as a single dynamically linked library that would be loaded into each process running on the user machine.
- the integration bundle 84 contains the reference monitor 83 and crypto engine 85 analogous to those 24 , 25 described in FIG. 6 .
- the client handler process 82 acts as a local proxy for the policy server 29 of FIG. 6 .
- the client handler process 82 contains a policy service and cache 86 for caching and managing control policies 14 received from the policy manager 27 of FIG. 6 , and it contains a key service and cache 87 for securely caching and managing KEKs from the key manager 28 of FIG. 6 .
- the reference monitor 83 requests the policy KEK from the key service and cache 87 in the client handler process 82 in order to extract the CEK for a protected document from its CPT (step 70 of FIG. 9 ).
- the integration bundle 84 scrubs the KEK from its memory and passes the CEK to the crypto engine 85 .
- the client handler process 82 also includes a logging service 88 for collecting log information from each integration bundle 84 and eventually passing that log information back to the policy server 29 of FIG. 6 .
- FIG. 11 describes the logic followed by the client handler process 82 of FIG. 10 .
- the handler sits in an event loop waiting for one of the several events labeled on the outgoing edges of step 90 .
- the client handler process 82 will request all policies 14 on the policy server 29 related to the user, as stated in step 91 .
- the handler process 82 in step 92 checks the policy server 29 for new policies 14 related to the logged-in user or changes to the cached policies 14 .
- Some control policies 14 state how long they can be cached and used off-line. When such policies timeout, the handler process 82 in step 93 will re-fetch expired policies 14 from the policy server 29 .
- the control policy KEK can also expire; the embodiment's handling of this time out condition is described below in the section labeled “Expired KEKs and CPT Update.”
- the preferred embodiment currently implements a three-way toggle (labeled Basic, Standard, and High) for setting control policy KEK expiry periods and cache timeout values.
- the policy KEK validity period and length of time before cached policy timeout are longer in the “Low” setting than the “Medium” setting, providing more potential exposure if a KEK is compromised or a control policy changed.
- the “High” setting provides the highest level of security and thus lowest level of exposure; however, it also implies that users can work off-line for shorter periods of time.
- Each deployment of the embodiment of the present invention will select control policy KEK expiry periods and cache timeout values according to their level of risk tolerance and need for off-line use of protected data objects 32 .
- the policy server 29 can prompt the handler processes 82 of online clients to flush and refresh their cached policies, as stated in step 94 . Off-line clients will synchronize their cached policy stores with the policy server 29 when again connected.
- the client handler process 82 in step 95 will check to make sure that the necessary network communication occurred. If everything was successful, the handler process 82 in step 96 will cache the received control policies 14 in secure storage. If the client had no network connectivity with the policy server 29 , the handler process 82 in step 97 will record the missed event for replay later in steps 98 and 99 , after network connectivity is restored.
- the CPT 23 of a protected data object 32 is the only structure in the present invention that contains the CEK used to encrypt the data object 32 .
- the CEK is encrypted with the KEK of the control policy 14 identified in the control policy id field 54 of FIG. 8 .
- the system limits the lifetime of such encryption keys. This means however that a protected data object 32 in the field may be no longer accessible once its control policy KEK expires.
- the system Since the system does not have access to all data objects protected by a control policy 14 when the policy's KEK expires, the system must have a mechanism for allowing access to data objects protected with an expired KEK and eventually lazily updating the CPT 23 of those data objects with the control policy's current KEK.
- the policy server 29 of FIG. 6 is responsible for defining and managing the lifetime of each control policy KEK.
- the preferred embodiment of the present invention assigns a unique identifier to each KEK within a control policy 14 .
- the policy server 29 stores the current KEK and maintains a history of KEKs for each active control policy 14 . This history may contain all KEKs ever generated for a control policy 14 , or it may contain only a limited number of the most recent expired KEKs for that policy.
- the encrypted CEK fields 56 and 57 of FIG. 8 include the (plaintext) value of the KEK unique identifier used to encrypt the CEK.
- the preferred embodiment of the present invention e.g., policy server 29 ) distributes to the client agent 26 not only the current KEK for a control policy 14 but also some portion of the most recent stored history of KEKs for the control policy. The length of the distributed history is less than or equal to the length of the history maintained on the policy server 29 by key manager 28 .
- FIG. 12 illustrates the scenario for an embodiment that distributes the current and past three expired KEKs 125 to the client agent 26 ; the figure assumes that a KEK comprises a key pair 121 a,b.
- the client agent 26 is able to decrypt the CEK, use this CEK to access the protected data object 32 , and create a new CPT for the protected data object 32 that uses the control policy's current KEK. All of this occurs without any involvement of the user or further communication with the policy server 29 , i.e. it could occur even while the client was off-line.
- the second case solves the problem that the expired KEK is not part of the history distributed to the client agent 26 .
- the client agent 26 must be online and able to communicate with the policy server 29 , since the policy server maintains a complete history expired KEKs for the control policy 14 of the protected data objects 32 .
- the preferred embodiment simply has the client agent 26 request the particular expired KEK of the control policy 14 of interest.
- the policy server 29 responds with the appropriate archived KEK, the client proceeds as above (as if it found the expired KEK in the distributed history).
- FIG. 12 also illustrates that there may exist times when a control policy 14 has no current KEK, due to the expiration of the current KEK.
- the preferred embodiment of the current invention generates a new KEK for a policy only when a client agent 26 asks for the user-specific usage rules and current KEK of a control policy (step 91 of FIG. 11 ).
- the policy server 29 does cache a set of pre-generated KEKs. This cache of KEKs is used to satisfy demands for a new current KEK in response to a client agent's 26 request for a control policy 14 without a current KEK.
- the cache of pre-generated KEKs is managed using a simple low and high watermark scheme well known to those practiced in the art. This approach in the preferred embodiment guarantees that the policy server 29 does not generate a large number of unused KEKs that it would need to archive for control policies 14 with protected data objects 32 that experience long periods of inactivity.
- the present invention supports two explicit persistence models for protected data objects 32 .
- the protected data objects 32 of a control policy 14 are either considered permanent or ephemeral assets.
- protected data objects 32 within a control policy 14 are considered permanent assets that should be protected and never lost.
- the preferred embodiment implements this model by encrypting the CEK of each protected data object 32 with the public master KEK of the policy server 29 .
- This encrypted value is stored in the one of the encrypted CEK fields (e.g., field 56 of FIG. 8 ); the other field (field 57 of FIG. 8 ) contains the CEK encrypted with the current KEK of the control policy identified in field 54 of FIG. 8 .
- the next section entitled “Disaster Recovery and CPT Version Control”, describes how the preferred embodiment uses the private master KEK to be always able to recover the CEK of a protected data object 32 .
- the master KEK of the policy server 29 also has a validity period, except that the validity period of the master KEK is typically longer than those assigned to control policy KEKs.
- the validity period can be longer because, as explained in the next section, the private portion of the master KEK is never distributed to the client agents 26 (i.e., it is used only on the policy server 29 ).
- the preferred embodiment Since the master KEK has a validity period, the preferred embodiment also associates a unique identifier with each generated master KEK of the policy server 29 , and this identifier is stored with the encrypted CEK in field 56 of FIG. 8 . Thus, contents stored in the storage for fields 56 and 57 in FIG. 8 are identical.
- protected data objects 32 within a control policy 14 are considered ephemeral assets that should be protected for some pre-determined period of time and then destroyed.
- destroyed we mean that it is theoretically impossible to recover the plaintext of the protected data object 32 .
- the preferred embodiment implements the “ephemeral” model by encrypting the CEK in the CPT 23 not with the policy server's master KEK but with a “policy master” KEK (field 56 of FIG. 8 ).
- the system never encrypts the CEK of the protected data object 32 with the server's master KEK.
- the policy master KEK has all of the same attributes as the server master KEK (e.g., it has a very long expiration time, never leaves the server 29 , and supports recovery of the CEK as long as it is archived).
- FIG. 13 expands upon the logic followed by the reference monitor 24 of FIG. 6 in step 70 of FIG. 9 .
- the monitor 24 attempts to extract the CEK of the protected data object 32 from the CPT 23 (both of FIG. 6 ).
- the client agent 26 already has the current KEK and some number (possibly zero) expired KEKs of the subject control policy 14 .
- the monitor 24 compares (step 110 ) the unique identifier of the current KEK with the unique identifier (stored in field 57 of FIG. 8 ) of the KEK used to encrypt the CEK. If the identifiers match, the monitor 24 proceeds with decryption of the encrypted CEK, as stated in step 115 of FIG. 13 .
- the KEK for the control policy can expire; the embodiment identifies such an occurrence by noticing that none of the unique identifiers of the stored KEKs match the unique identifier of the KEK used to encrypt the CEK.
- the monitor 24 extracts the CPT 23 and sends it to the policy server 29 with a request for the server to encrypt the CEK with the current policy KEK.
- the server 29 in step 112 recovers the CEK by using the appropriate master KEK (server or policy), as indicated by the unique identifier stored with the encrypted CEK.
- the server 29 in step 113 returns the updated CPT to client agent 26 .
- the client agent 26 in step 114 retrieves the CEK from the received CPT, generates a new CEK, wraps it into an updated CPT, and replaces the original CPT 23 if the protected data object 32 is not marked read-only or stored on read-only media, and proceeds to step 115 using the updated CPT.
- the client may cache the received CPT in the case where the data object 32 is marked read-only.
- the preferred embodiment treats the versioning of CPT formats as a disaster recovery problem. This approach allows the embodiment to distribute client agents 26 with code that only knows how to interpret the current CPT format and how to recover from disasters.
- FIG. 14 describes the logic followed by the reference monitor 24 of FIG. 6 when it gets to step 64 of FIG. 9 .
- the monitor 24 reaches this logic when the version of the CPT 23 of a protected data object 32 (both of FIG. 6 ) does not match the CPT version supported by the monitor 24 .
- the reference monitor 24 in the client agent 26 in step 100 extracts the entire CPT from the protected data object 32 .
- the client agent 26 sends the extracted CPT to the policy server 29 with a request to convert the CPT to the specified version that the client agent 26 supports.
- the server 29 in step 102 uses the version field 51 of the CPT to select the correct converter routine, which simply maps the fields in the given version of the CPT data structure to the fields in the specified version (possibly using a canonical intermediate form). Notice that only the server 29 needs to have the entire set of converter codes.
- the server 29 in step 103 decrypts the CEK using either the indicated control policy KEK or the master KEK, and re-encrypts the CEK with the current control policy KEK and master KEK.
- the server 29 in step 104 returns the updated CPT to client agent 26 .
- the client in step 105 extracts the current CEK, renews the CEK, updates the received CPT, caches the updated CPT, replaces the original CPT if the protected data object 32 is not marked read-only or stored on read-only media, and proceeds to step 65 of FIG. 9 using the updated CPT.
- the preferred embodiment also supports a publish-only model of document generation and distribution.
- the preferred embodiment allows the business process administrator to indicate that the KEK for a control policy 14 should always remain valid. This option is desirable when the administrator knows that the data objects protected by the control policy 14 are read-only or are stored on read-only computer media. Even though the system cannot update the CPT 23 of a read-only data object 32 , it may still want to expire the policies 14 associated with read-only documents in the client's policy cache 86 to restrict the length of time allowed for off-line viewing of read-only data objects.
- FIG. 15 illustrates how the preferred embodiment displays the name for the control policy 14 currently protecting the data object displayed in a computer window.
- the subject control policy name is displayed in a drop-down window object called the droplet control 120 .
- the drop-down window displays the name of the business process 122 containing the active control policy 124 , and the other business processes 12 and control policies 14 that the user may transfer the protected data object to.
- an ActiveX Window supports droplet control 120 .
- Contents and hierarchy of same are obtained from policy server 29 via cache 86 , tag 23 and/or client handler 82 as further explained below.
- FIG. 16 describes the logic involved in transferring a data object (represented by a document) between control policies 14 .
- the transferring of a protected data object 32 from one control policy 14 to another is an important aspect of a dynamic, distributed, and collaborative environment, as described earlier in reference to FIGS. 2-5 .
- the preferred embodiment allows business process owners (i.e. business administrators) to specify the flow of information between control policies 14 within or between business processes 12 .
- the business process owners define the flows while authorized users perform the actual transferring of protected data objects. Often a transfer will occur as part of normal workflow.
- An authorized user in step 130 opens a document in a rights-management-aware application 21 .
- This might be a new document 22 (data object), in which case the client agent 26 in step 132 displays the default “Unmanaged” control policy in droplet control 120 .
- this might be an existing protected document, in which case the agent 26 in step 132 displays the name of the control policy protecting the document 22 in the droplet control 120 .
- the user in step 134 edits and further manipulates open document within the usage rights specified by the control policy 14 for that user. The logic flow from step 134 back to itself represents the fact that such editing may continue for some unspecified and extended period of time.
- the user in step 136 may decide to activate the droplet control 120 and select a new control policy 14 to which he would like to transfer the protected document.
- the agent 26 in step 138 creates a new CPT 23 with the selected control policy identifier in it and tags the document 22 with it. If specified in the control policy 14 , an authorized user may in step 136 select the “Unmanaged” control policy, in which case the agent 26 in step 138 does not create a new CPT, deletes the existing CPT, and decrypts the document 22 .
- the user can continue to edit the document 22 under the constraints of the new control policy 14 .
- Each control policy 14 in the system records a list of users with the authority to transfer data objects 22 out of the protection provided by that control policy.
- the control policy 14 also contains a list of users with the authority to assign new data objects 22 to the control policy.
- the user In order for a user to transfer a data object 22 from its current control policy 14 to a new control policy, the user must be a member of the “transfer-out” list of the current control policy 14 and a member of the “assign-to” list of the new control policy 14 .
- “Transfer” rights are not necessary, i.e. the “transfer-out” and “assign-to” lists of a control policy 14 can be empty. However, in the preferred embodiment of the present invention, at least one of the roles in a control policy 14 will allow users to assign data objects 22 to the policy 14 . If none of the roles has assign privileges, the policy 14 would not have any meaning (i.e., it would never have objects associated with it).
- the “assign-to” list may become empty because the privilege was needed only initially to assign data objects to the control policy 14 . For instance, a member may have “assign-to” privileges during the initial creation of the policy and assignment of data objects to the policy. After this initialization, the “assign-to” privilege is removed and the policy 14 controls a fixed set of objects.
- the preferred embodiment supports three kinds of “transfers” within the hierarchy of business processes 12 ( FIG. 1 ):
- the policy 14 associated with a data object 22 may be changed automatically via merge operations (e.g., cut/paste operations).
- merge operations e.g., cut/paste operations.
- the preferred embodiment of the present invention implements the following kinds of automatic transfers on merge operations: If a protected data object 32 is pasted into an unmanaged data object, the targeted data object assumes the policy 14 of the pasted object. If the protected data object is pasted into a protected data object with a different policy 14 , the target object maintains its policy and the paste is allowed to complete only if the source data object's policy allows transfer and the target data object's policy allows assign.
- the preferred embodiment of the present invention implements “automatic transfers” by integrating a standalone transfer tool into a software component of an existing electronic business process.
- a report generator for a large database system might be modified to use the standalone transfer tool to produce reports as protected data objects 32 under a pre-configured control policy 14 .
- an email server might be configured to use the standalone transfer tool as a type of filter (i.e. exploiting those interfaces used by anti-virus filters) to transfer automatically data objects from one control policy 14 to another based on the people or groups in the “to” and “from” fields of an email message.
- An automatic transfer would take place only if the sender of the email message had the appropriate transfer rights.
- Such an embodiment would also want to employ digital signatures to ensure that the email message actually came from the person specified in the “from” field.
- Collaboration in a dynamic and distributed environment implies that the only authoritative copy of a protected data object 32 may reside in the field, away from the policy server 29 , and in locations not accessible by the business process owner.
- a system in support of dynamic, distributed, and collaborate environments must make it easy for two (or more) authorized users to generate and share protected data objects 32 both on and off-line.
- the preferred embodiment of the present invention supports such a goal with the only criterion that the authorized users must have had some recent access to the policy server 29 , where “recent” means within the cache timeout for the control policy 14 under which they wish to collaborate.
- collaboration is driven by pre-defined business processes 12 and not by pre-registered data objects 32 .
- FIG. 17 presents a flow diagram illustrating collaboration between two users within a rights management system 200 based on the present invention, where the collaboration occurs through a document (data object 22 ) that was never known to the policy server 29 .
- Step 140 begins with an administrator creating a control policy P that includes both users A and B in roles. Users A and B in step 141 are logged in to their laptops connected to the corporate network where the policy server 29 is located.
- the client handler processes 82 on the users' laptops cache the control policy P and its KEK. Users of A and B in step 143 then disconnect from the corporate network and take their laptops to an off-site meeting.
- the client handler processes 82 are prepared to permit any collaborative activity within the bounds of the cached control policies 14 ; the client handler processes 82 act as trusted agents of the rights management system 200 .
- step 144 While off-line, user A in step 144 creates a sensitive data object D (in the example, a document) and protects it with control policy P. This action takes place while user A is disconnected from the policy server 29 . Since control policy P is cached on user A's laptop, he or she is able to create and protect document D.
- User A in step 145 gives a copy of document D to user B.
- User B in step 146 is able to edit protected document D on his or her laptop while also disconnected from the policy server 29 .
- the collaboration of users A and B around document D (or any other document protected by control policy P) continues in step 147 , as long as no expiry periods occur.
- the preferred embodiment of the present invention supports logging of the activities (granted and denied) monitored and controlled by the client agent 26 of FIG. 6 .
- the logging service 88 in FIG. 10 collects the log data from the individual rights-management-aware applications 21 and communicates the data back to the policy server 29 . The collected information can then be reviewed and mined by the business process owner to support business needs, such as audits, forensics, and compliance.
- Auditing the activities associated with the data objects 32 of a business process 12 does not necessarily require encryption of the identified data objects 32 .
- the identified data objects 32 may be simply “managed” and not “protected.” In other words, auditing requires only that an identified data object 32 have a CPT 23 ; it does not require that the contents 22 of that data object 32 be encrypted.
- the object id field 55 in the CPT 23 aids in audits, forensics, and compliance. It is a globally unique identifier generated when the client agent 26 first creates a protected data object 32 . If the new data object 22 was generated from an existing protected data object (e.g., via a “Save As” command), a log record is written linking the new and existing data objects using their object identifier 55 values. Otherwise, the system 200 records that the new protected data object 32 was generated from scratch or from an unmanaged data object 22 .
Abstract
Description
- (a) An authorized user may be granted the privilege of changing the association between a
data object 22 and itscontrol policy 14 within asingle business process 12. - (b) A user may also be granted the privilege of moving data objects 22 between business processes 12.
- (c) A user may also be granted the privilege of moving data objects 22 out of the rights management system, i.e. the data object 22 resulting from the transfer is no longer managed or protected.
Claims (44)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/856,112 US7587749B2 (en) | 2003-06-02 | 2004-05-28 | Computer method and apparatus for managing data objects in a distributed context |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US47510903P | 2003-06-02 | 2003-06-02 | |
US10/856,112 US7587749B2 (en) | 2003-06-02 | 2004-05-28 | Computer method and apparatus for managing data objects in a distributed context |
Publications (2)
Publication Number | Publication Date |
---|---|
US20050028006A1 US20050028006A1 (en) | 2005-02-03 |
US7587749B2 true US7587749B2 (en) | 2009-09-08 |
Family
ID=33511650
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/856,112 Active 2027-03-20 US7587749B2 (en) | 2003-06-02 | 2004-05-28 | Computer method and apparatus for managing data objects in a distributed context |
US10/858,827 Abandoned US20050008163A1 (en) | 2003-06-02 | 2004-06-01 | Computer method and apparatus for securely managing data objects in a distributed context |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/858,827 Abandoned US20050008163A1 (en) | 2003-06-02 | 2004-06-01 | Computer method and apparatus for securely managing data objects in a distributed context |
Country Status (5)
Country | Link |
---|---|
US (2) | US7587749B2 (en) |
EP (1) | EP1629382A4 (en) |
JP (2) | JP4759513B2 (en) |
CA (1) | CA2527668A1 (en) |
WO (1) | WO2004109443A2 (en) |
Cited By (150)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070294699A1 (en) * | 2006-06-16 | 2007-12-20 | Microsoft Corporation | Conditionally reserving resources in an operating system |
US20080059941A1 (en) * | 2006-08-30 | 2008-03-06 | Timothy Payne | Method and system for supporting a collaborative development environment |
US20080072074A1 (en) * | 2006-09-19 | 2008-03-20 | Fujitsu Limited | Information-protection device, information-protection system, information-protection method, and program-storage medium storing information protection program |
US20080109911A1 (en) * | 2006-11-03 | 2008-05-08 | Microsoft Corporation | Send/Lend Business Rights |
US20090038005A1 (en) * | 2007-07-31 | 2009-02-05 | Cisco Technology, Inc. | Privilege-based access system |
US20090168657A1 (en) * | 2007-12-30 | 2009-07-02 | Rahoul Puri | System and Method for Validating Packet Classification |
US20110022516A1 (en) * | 2009-07-25 | 2011-01-27 | Hong Gao | Multiple Payments at One Click |
US20110219081A1 (en) * | 2010-03-08 | 2011-09-08 | Microsoft Corporation | Zone classification of electronic mail messages |
US20110219424A1 (en) * | 2010-03-05 | 2011-09-08 | Microsoft Corporation | Information protection using zones |
US8209293B2 (en) | 2003-04-03 | 2012-06-26 | Commvault Systems, Inc. | System and method for extended media retention |
US8230171B2 (en) | 2005-12-19 | 2012-07-24 | Commvault Systems, Inc. | System and method for improved media identification in a storage device |
US20120259858A1 (en) * | 2002-11-18 | 2012-10-11 | Fairchild Grainville R | Method and apparatus providing omnibus view of online and offline content of various file types and sources |
WO2012148654A1 (en) * | 2011-04-29 | 2012-11-01 | Siemens Product Lifecycle Management Software Inc. | Object-based models in document management |
US8341182B2 (en) | 2006-12-22 | 2012-12-25 | Commvault Systems, Inc. | Systems and methods of media management, such as management of media to and from a media storage library |
US8341127B1 (en) * | 2006-02-02 | 2012-12-25 | Emc Corporation | Client initiated restore |
US8539118B2 (en) | 2006-09-22 | 2013-09-17 | Commvault Systems, Inc. | Systems and methods of media management, such as management of media to and from a media storage library, including removable media |
US8706976B2 (en) | 2007-08-30 | 2014-04-22 | Commvault Systems, Inc. | Parallel access virtual tape library and drives |
US8832031B2 (en) | 2006-12-22 | 2014-09-09 | Commvault Systems, Inc. | Systems and methods of hierarchical storage management, such as global management of storage operations |
US20140310423A1 (en) * | 2005-12-29 | 2014-10-16 | Nextlabs, Inc. | Preventing Conflicts of Interests Between Two or More Groups Using Applications |
US8886902B1 (en) | 2006-02-02 | 2014-11-11 | Emc Corporation | Disk backup set access |
US20140351585A1 (en) * | 2012-01-12 | 2014-11-27 | Sony Corporation | Information storage device, information processing system, information processing method, and program |
US9069799B2 (en) | 2012-12-27 | 2015-06-30 | Commvault Systems, Inc. | Restoration of centralized data storage manager, such as data storage manager in a hierarchical data storage system |
US9201917B2 (en) | 2003-04-03 | 2015-12-01 | Commvault Systems, Inc. | Systems and methods for performing storage operations in a computer network |
US9244779B2 (en) | 2010-09-30 | 2016-01-26 | Commvault Systems, Inc. | Data recovery operations, such as recovery from modified network data management protocol data |
US9251097B1 (en) * | 2011-03-22 | 2016-02-02 | Amazon Technologies, Inc. | Redundant key management |
US20160154963A1 (en) * | 2012-08-08 | 2016-06-02 | Amazon Technologies, Inc. | Redundant key management |
US9507525B2 (en) | 2004-11-05 | 2016-11-29 | Commvault Systems, Inc. | Methods and system of pooling storage devices |
US9529871B2 (en) | 2012-03-30 | 2016-12-27 | Commvault Systems, Inc. | Information management of mobile device data |
US9928144B2 (en) | 2015-03-30 | 2018-03-27 | Commvault Systems, Inc. | Storage management of data using an open-archive architecture, including streamlined access to primary data originally stored on network-attached storage and archived to secondary storage |
RU2658894C1 (en) * | 2017-07-26 | 2018-06-25 | Открытое Акционерное Общество "Информационные Технологии И Коммуникационные Системы" | Method of the data access control with the users accounts protection |
US10101913B2 (en) | 2015-09-02 | 2018-10-16 | Commvault Systems, Inc. | Migrating data to disk without interrupting running backup operations |
US20190171731A1 (en) * | 2017-12-06 | 2019-06-06 | International Business Machines Corporation | Code Management System |
US10547678B2 (en) | 2008-09-15 | 2020-01-28 | Commvault Systems, Inc. | Data transfer techniques within data storage devices, such as network attached storage performing data migration |
US10601907B2 (en) * | 2017-09-22 | 2020-03-24 | Artiste QB Net Inc. | System and method for platform to securely distribute compute workload to web capable devices |
US10742735B2 (en) | 2017-12-12 | 2020-08-11 | Commvault Systems, Inc. | Enhanced network attached storage (NAS) services interfacing to cloud storage |
US20210110053A1 (en) * | 2018-04-19 | 2021-04-15 | Murata Machinery, Ltd. | Exclusive control system and exclusive control method |
US10997542B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Privacy management systems and methods |
US10997315B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US10997318B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
US11004125B2 (en) | 2016-04-01 | 2021-05-11 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US11025675B2 (en) | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11023842B2 (en) | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US11023616B2 (en) | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11030274B2 (en) | 2016-06-10 | 2021-06-08 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11030563B2 (en) | 2016-06-10 | 2021-06-08 | OneTrust, LLC | Privacy management systems and methods |
US11030327B2 (en) | 2016-06-10 | 2021-06-08 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11036882B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US11036674B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US11038925B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11036771B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11057356B2 (en) | 2016-06-10 | 2021-07-06 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US11062051B2 (en) | 2016-06-10 | 2021-07-13 | OneTrust, LLC | Consent receipt management systems and related methods |
US11068618B2 (en) | 2016-06-10 | 2021-07-20 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US11070593B2 (en) * | 2016-06-10 | 2021-07-20 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11074367B2 (en) | 2016-06-10 | 2021-07-27 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11087260B2 (en) | 2016-06-10 | 2021-08-10 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US11100444B2 (en) | 2016-06-10 | 2021-08-24 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US11100445B2 (en) | 2016-06-10 | 2021-08-24 | OneTrust, LLC | Data processing systems for assessing readiness for responding to privacy-related incidents |
US11113416B2 (en) | 2016-06-10 | 2021-09-07 | OneTrust, LLC | Application privacy scanning systems and related methods |
US11122011B2 (en) | 2016-06-10 | 2021-09-14 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US11120162B2 (en) | 2016-06-10 | 2021-09-14 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11120161B2 (en) | 2016-06-10 | 2021-09-14 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11126748B2 (en) | 2016-06-10 | 2021-09-21 | OneTrust, LLC | Data processing consent management systems and related methods |
US11134086B2 (en) | 2016-06-10 | 2021-09-28 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US11138299B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11138336B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11138242B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11138318B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US11144675B2 (en) | 2018-09-07 | 2021-10-12 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11146566B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11144622B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Privacy management systems and methods |
US11144670B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US11151233B2 (en) | 2016-06-10 | 2021-10-19 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11157654B2 (en) | 2018-09-07 | 2021-10-26 | OneTrust, LLC | Data processing systems for orphaned data identification and deletion and related methods |
US11157600B2 (en) | 2016-06-10 | 2021-10-26 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11182501B2 (en) | 2016-06-10 | 2021-11-23 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11188615B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11188862B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Privacy management systems and methods |
US11195134B2 (en) | 2016-06-10 | 2021-12-07 | OneTrust, LLC | Privacy management systems and methods |
US11200341B2 (en) | 2016-06-10 | 2021-12-14 | OneTrust, LLC | Consent receipt management systems and related methods |
US11210420B2 (en) | 2016-06-10 | 2021-12-28 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11222142B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems for validating authorization for personal data collection, storage, and processing |
US11222139B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems and methods for automatic discovery and assessment of mobile software development kits |
US11222309B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11227247B2 (en) | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US11228620B2 (en) | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11238390B2 (en) | 2016-06-10 | 2022-02-01 | OneTrust, LLC | Privacy management systems and methods |
US11240273B2 (en) | 2016-06-10 | 2022-02-01 | OneTrust, LLC | Data processing and scanning systems for generating and populating a data inventory |
US11244367B2 (en) | 2016-04-01 | 2022-02-08 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US11244071B2 (en) | 2016-06-10 | 2022-02-08 | OneTrust, LLC | Data processing systems for use in automatically generating, populating, and submitting data subject access requests |
US11277448B2 (en) | 2016-06-10 | 2022-03-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11294939B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11295316B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11301589B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Consent receipt management systems and related methods |
US11301796B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US11308435B2 (en) | 2016-06-10 | 2022-04-19 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11328092B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US11336697B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11343284B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11341447B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Privacy management systems and methods |
US11354434B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11354435B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11361057B2 (en) | 2016-06-10 | 2022-06-14 | OneTrust, LLC | Consent receipt management systems and related methods |
US11366909B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11366786B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US11373007B2 (en) | 2017-06-16 | 2022-06-28 | OneTrust, LLC | Data processing systems for identifying whether cookies contain personally identifying information |
US11392720B2 (en) | 2016-06-10 | 2022-07-19 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11397819B2 (en) | 2020-11-06 | 2022-07-26 | OneTrust, LLC | Systems and methods for identifying data processing activities based on data discovery results |
US11403377B2 (en) | 2016-06-10 | 2022-08-02 | OneTrust, LLC | Privacy management systems and methods |
US11409908B2 (en) | 2016-06-10 | 2022-08-09 | OneTrust, LLC | Data processing systems and methods for populating and maintaining a centralized database of personal data |
US11416634B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11416590B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11418492B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US11416798B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US11416589B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11416109B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US20220277272A1 (en) * | 2016-12-08 | 2022-09-01 | Airwatch Llc | Secured attachment management |
US11438386B2 (en) | 2016-06-10 | 2022-09-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11436373B2 (en) | 2020-09-15 | 2022-09-06 | OneTrust, LLC | Data processing systems and methods for detecting tools for the automatic blocking of consent requests |
US11444976B2 (en) | 2020-07-28 | 2022-09-13 | OneTrust, LLC | Systems and methods for automatically blocking the use of tracking tools |
US11442906B2 (en) | 2021-02-04 | 2022-09-13 | OneTrust, LLC | Managing custom attributes for domain objects defined within microservices |
US11461500B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US11475136B2 (en) | 2016-06-10 | 2022-10-18 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US11475165B2 (en) | 2020-08-06 | 2022-10-18 | OneTrust, LLC | Data processing systems and methods for automatically redacting unstructured data from a data subject access request |
US11481710B2 (en) | 2016-06-10 | 2022-10-25 | OneTrust, LLC | Privacy management systems and methods |
US11494515B2 (en) | 2021-02-08 | 2022-11-08 | OneTrust, LLC | Data processing systems and methods for anonymizing data samples in classification analysis |
US11520928B2 (en) | 2016-06-10 | 2022-12-06 | OneTrust, LLC | Data processing systems for generating personal data receipts and related methods |
US11526624B2 (en) | 2020-09-21 | 2022-12-13 | OneTrust, LLC | Data processing systems and methods for automatically detecting target data transfers and target data processing |
US11533315B2 (en) | 2021-03-08 | 2022-12-20 | OneTrust, LLC | Data transfer discovery and analysis systems and related methods |
US11544409B2 (en) | 2018-09-07 | 2023-01-03 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11546661B2 (en) | 2021-02-18 | 2023-01-03 | OneTrust, LLC | Selective redaction of media content |
US11544667B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11562078B2 (en) | 2021-04-16 | 2023-01-24 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
US11562097B2 (en) | 2016-06-10 | 2023-01-24 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US11586700B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US11586762B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for auditing data request compliance |
US11593223B1 (en) | 2021-09-02 | 2023-02-28 | Commvault Systems, Inc. | Using resource pool administrative entities in a data storage management system to provide shared infrastructure to tenants |
US11601464B2 (en) | 2021-02-10 | 2023-03-07 | OneTrust, LLC | Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system |
US11620142B1 (en) | 2022-06-03 | 2023-04-04 | OneTrust, LLC | Generating and customizing user interfaces for demonstrating functions of interactive user environments |
US11625502B2 (en) | 2016-06-10 | 2023-04-11 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US11636171B2 (en) | 2016-06-10 | 2023-04-25 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11651402B2 (en) | 2016-04-01 | 2023-05-16 | OneTrust, LLC | Data processing systems and communication systems and methods for the efficient generation of risk assessments |
US11651106B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11651104B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11675929B2 (en) | 2016-06-10 | 2023-06-13 | OneTrust, LLC | Data processing consent sharing systems and related methods |
US11687528B2 (en) | 2021-01-25 | 2023-06-27 | OneTrust, LLC | Systems and methods for discovery, classification, and indexing of data in a native computing system |
US11727141B2 (en) | 2016-06-10 | 2023-08-15 | OneTrust, LLC | Data processing systems and methods for synching privacy-related user consent across multiple computing devices |
US11775348B2 (en) | 2021-02-17 | 2023-10-03 | OneTrust, LLC | Managing custom workflows for domain objects defined within microservices |
US11797528B2 (en) | 2020-07-08 | 2023-10-24 | OneTrust, LLC | Systems and methods for targeted data discovery |
US11960564B2 (en) | 2023-02-02 | 2024-04-16 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
Families Citing this family (212)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000503154A (en) * | 1996-01-11 | 2000-03-14 | エムアールジェイ インコーポレイテッド | System for controlling access and distribution of digital ownership |
US20030101155A1 (en) * | 2001-11-23 | 2003-05-29 | Parag Gokhale | Method and system for scheduling media exports |
US7380120B1 (en) | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
US7565683B1 (en) * | 2001-12-12 | 2009-07-21 | Weiqing Huang | Method and system for implementing changes to security policies in a distributed security system |
US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
US7783765B2 (en) | 2001-12-12 | 2010-08-24 | Hildebrand Hal S | System and method for providing distributed access control to secured documents |
US7178033B1 (en) | 2001-12-12 | 2007-02-13 | Pss Systems, Inc. | Method and apparatus for securing digital assets |
US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
US7260555B2 (en) * | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
US7562232B2 (en) * | 2001-12-12 | 2009-07-14 | Patrick Zuili | System and method for providing manageability to security information for secured items |
US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
USRE41546E1 (en) | 2001-12-12 | 2010-08-17 | Klimenty Vainstein | Method and system for managing security tiers |
US7631184B2 (en) * | 2002-05-14 | 2009-12-08 | Nicholas Ryan | System and method for imposing security on copies of secured items |
US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
US7478418B2 (en) * | 2001-12-12 | 2009-01-13 | Guardian Data Storage, Llc | Guaranteed delivery of changes to security policies in a distributed system |
US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
US7681034B1 (en) | 2001-12-12 | 2010-03-16 | Chang-Ping Lee | Method and apparatus for securing electronic data |
US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
US8176334B2 (en) * | 2002-09-30 | 2012-05-08 | Guardian Data Storage, Llc | Document security system that permits external users to gain access to secured files |
US20050071657A1 (en) * | 2003-09-30 | 2005-03-31 | Pss Systems, Inc. | Method and system for securing digital assets using time-based security criteria |
US7748045B2 (en) * | 2004-03-30 | 2010-06-29 | Michael Frederick Kenrich | Method and system for providing cryptographic document retention with off-line access |
US8613102B2 (en) * | 2004-03-30 | 2013-12-17 | Intellectual Ventures I Llc | Method and system for providing document retention using cryptography |
US7356836B2 (en) * | 2002-06-28 | 2008-04-08 | Microsoft Corporation | User controls for a computer |
US7512810B1 (en) * | 2002-09-11 | 2009-03-31 | Guardian Data Storage Llc | Method and system for protecting encrypted files transmitted over a network |
US7836310B1 (en) | 2002-11-01 | 2010-11-16 | Yevgeniy Gutnik | Security system that uses indirect password-based encryption |
US7890990B1 (en) | 2002-12-20 | 2011-02-15 | Klimenty Vainstein | Security system with staging capabilities |
US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
AP2005003476A0 (en) * | 2003-06-05 | 2005-12-31 | Intertrust Tech Corp | Interoperable systems and methods for peer-to-peerservice orchestration. |
US7730543B1 (en) | 2003-06-30 | 2010-06-01 | Satyajit Nath | Method and system for enabling users of a group shared across multiple file security systems to access secured files |
US7703140B2 (en) * | 2003-09-30 | 2010-04-20 | Guardian Data Storage, Llc | Method and system for securing digital assets using process-driven security policies |
US8127366B2 (en) | 2003-09-30 | 2012-02-28 | Guardian Data Storage, Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
US20050086531A1 (en) * | 2003-10-20 | 2005-04-21 | Pss Systems, Inc. | Method and system for proxy approval of security changes for a file security system |
US20050122345A1 (en) * | 2003-12-05 | 2005-06-09 | Kirn Kevin N. | System and method for media-enabled messaging having publish-and-send feature |
US20050138371A1 (en) * | 2003-12-19 | 2005-06-23 | Pss Systems, Inc. | Method and system for distribution of notifications in file security systems |
US7702909B2 (en) * | 2003-12-22 | 2010-04-20 | Klimenty Vainstein | Method and system for validating timestamps |
JP4676782B2 (en) * | 2004-04-28 | 2011-04-27 | 株式会社リコー | Information processing apparatus, operation permission data generation method, operation permission data generation permission determination method, operation permission data generation program, operation permission data generation permission determination program, and recording medium |
US7530093B2 (en) * | 2004-04-30 | 2009-05-05 | Microsoft Corporation | Securing applications and operating systems |
US7716716B1 (en) * | 2004-06-24 | 2010-05-11 | Sprint Communications Company L.P. | Method and system for architecting enterprise data security |
US20060005227A1 (en) * | 2004-07-01 | 2006-01-05 | Microsoft Corporation | Languages for expressing security policies |
US7707427B1 (en) * | 2004-07-19 | 2010-04-27 | Michael Frederick Kenrich | Multi-level file digests |
US7657923B2 (en) * | 2004-07-23 | 2010-02-02 | Microsoft Corporation | Framework for a security system |
US20060174111A1 (en) * | 2004-09-08 | 2006-08-03 | Burns Paul E | Method and system for electronic communication risk management |
US8185555B2 (en) | 2004-10-22 | 2012-05-22 | International Business Machines Corporation | Model extension framework |
US20060101091A1 (en) * | 2004-10-22 | 2006-05-11 | International Business Machines Corporation | Recovering references in an extended model |
JP4301516B2 (en) * | 2005-03-08 | 2009-07-22 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Method for restricting use of file, information processing apparatus, and program |
US7356539B2 (en) * | 2005-04-04 | 2008-04-08 | Research In Motion Limited | Policy proxy |
US7647621B2 (en) * | 2005-04-22 | 2010-01-12 | Mcafee, Inc. | System, method and computer program product for applying electronic policies |
US20060265377A1 (en) * | 2005-05-19 | 2006-11-23 | Trimergent | Personalizable information networks |
US20060265395A1 (en) * | 2005-05-19 | 2006-11-23 | Trimergent | Personalizable information networks |
US20060265394A1 (en) * | 2005-05-19 | 2006-11-23 | Trimergent | Personalizable information networks |
US7882565B2 (en) * | 2005-09-02 | 2011-02-01 | Microsoft Corporation | Controlled access to objects or areas in an electronic document |
US8239682B2 (en) * | 2005-09-28 | 2012-08-07 | Nl Systems, Llc | Method and system for digital rights management of documents |
US20070204078A1 (en) * | 2006-02-09 | 2007-08-30 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
AU2006304655B2 (en) * | 2005-10-18 | 2012-08-16 | Intertrust Technologies Corporation | Methods for digital rights management |
US9626667B2 (en) * | 2005-10-18 | 2017-04-18 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
US8893302B2 (en) * | 2005-11-09 | 2014-11-18 | Motorola Mobility Llc | Method for managing security keys utilized by media devices in a local area network |
WO2007059377A2 (en) * | 2005-11-10 | 2007-05-24 | Motorola Inc. | Transferring rights to media content between networked media devices |
JP4839810B2 (en) * | 2005-12-06 | 2011-12-21 | 富士ゼロックス株式会社 | Electronic document management system, program and method |
US8621549B2 (en) | 2005-12-29 | 2013-12-31 | Nextlabs, Inc. | Enforcing control policies in an information management system |
US9942271B2 (en) * | 2005-12-29 | 2018-04-10 | Nextlabs, Inc. | Information management system with two or more interactive enforcement points |
US8627490B2 (en) * | 2005-12-29 | 2014-01-07 | Nextlabs, Inc. | Enforcing document control in an information management system |
US9081981B2 (en) * | 2005-12-29 | 2015-07-14 | Nextlabs, Inc. | Techniques and system to manage access of information using policies |
US8677499B2 (en) * | 2005-12-29 | 2014-03-18 | Nextlabs, Inc. | Enforcing access control policies on servers in an information management system |
EP1982458B1 (en) * | 2006-01-26 | 2018-12-05 | LG Electronics Inc. | Apparatus and method for moving rights object from one device to another device via server |
US20070198425A1 (en) * | 2006-02-17 | 2007-08-23 | International Business Machines Corporation | Method and system for auditing digital rights in a content management system |
JP4838916B2 (en) * | 2006-08-01 | 2011-12-14 | 株式会社日立ソリューションズ | Client server system |
US8931055B2 (en) * | 2006-08-31 | 2015-01-06 | Accenture Global Services Gmbh | Enterprise entitlement framework |
CA2702509A1 (en) * | 2006-10-13 | 2008-04-17 | Ets | System for supporting collaborative work |
CN101246527B (en) * | 2007-02-15 | 2011-07-20 | 华为技术有限公司 | Method and system for providing and using copyright description |
US8484309B2 (en) * | 2007-02-20 | 2013-07-09 | International Business Machines Corporation | Owner controlled access to shared data resource |
US7953928B2 (en) | 2007-02-22 | 2011-05-31 | Network Appliance, Inc. | Apparatus and a method to make data sets conform to data management policies |
JP5212921B2 (en) * | 2007-03-12 | 2013-06-19 | 日本電気株式会社 | File server system and file management method |
EP1978468A1 (en) * | 2007-04-04 | 2008-10-08 | Sap Ag | A method and a system for secure execution of workflow tasks in a distributed workflow management system within a decentralized network system |
US8904391B2 (en) | 2007-04-23 | 2014-12-02 | International Business Machines Corporation | Policy-based access control approach to staff activities of a business process |
US20080301276A1 (en) * | 2007-05-09 | 2008-12-04 | Ec Control Systems Llc | System and method for controlling and managing electronic communications over a network |
US8140470B2 (en) * | 2007-07-31 | 2012-03-20 | Sap Ag | Unified and extensible implementation of a change state ID for update services based on a hash calculation |
US20090077473A1 (en) * | 2007-09-13 | 2009-03-19 | James Williams | System and method of managing workflow of an authoring assignment |
WO2009043576A1 (en) * | 2007-10-02 | 2009-04-09 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Concept for a key management in a drm system |
US8140953B1 (en) * | 2007-10-26 | 2012-03-20 | Adobe Systems Incorporated | Flexible media catalog for multi-format project export |
JP4963103B2 (en) * | 2007-11-21 | 2012-06-27 | キヤノンItソリューションズ株式会社 | Information processing system, information processing apparatus, control method thereof, and program |
US9552491B1 (en) * | 2007-12-04 | 2017-01-24 | Crimson Corporation | Systems and methods for securing data |
US8326814B2 (en) | 2007-12-05 | 2012-12-04 | Box, Inc. | Web-based file management system and service |
JP4470997B2 (en) | 2007-12-25 | 2010-06-02 | 富士ゼロックス株式会社 | Security policy switching device, security policy switching program, and security policy management system |
US8091082B2 (en) * | 2008-03-12 | 2012-01-03 | DGN Technologies, Inc. | Systems and methods for risk analysis and updating of software |
US8646027B2 (en) * | 2008-06-27 | 2014-02-04 | Microsoft Corporation | Workflow based authorization for content access |
US8416695B2 (en) * | 2008-06-30 | 2013-04-09 | Huawei Technologies Co., Ltd. | Method, device and system for network interception |
US8886571B2 (en) * | 2008-08-19 | 2014-11-11 | Oracle America, Inc. | System and method for service virtualization in a service governance framework |
TWI440469B (en) * | 2008-09-26 | 2014-06-11 | Chugai Pharmaceutical Co Ltd | Improved antibody molecules |
EP2192514A1 (en) * | 2008-11-26 | 2010-06-02 | Thomson Licensing | Method and system for processing digital content according to a workflow |
US9152644B2 (en) * | 2008-12-30 | 2015-10-06 | Novell, Inc. | Systems and methods for providing collaborative editing |
US7945589B1 (en) | 2009-02-11 | 2011-05-17 | Bsp Software Llc | Integrated change management in a business intelligence environment |
US8751464B1 (en) | 2009-02-11 | 2014-06-10 | Avnet, Inc. | Integrated version control in a business intelligence environment |
US9047575B2 (en) * | 2009-05-04 | 2015-06-02 | Oracle International Corporation | Creative process modeling and tracking system |
US9507793B2 (en) * | 2009-09-29 | 2016-11-29 | International Business Machines Corporation | File resharing management |
JP5585062B2 (en) * | 2009-12-04 | 2014-09-10 | ソニー株式会社 | Information processing apparatus, information processing method, data management server, and data synchronization system |
DE102010006432A1 (en) * | 2009-12-29 | 2011-06-30 | Siemens Aktiengesellschaft, 80333 | Method and system for providing EDRM-protected data objects |
EP2383955B1 (en) | 2010-04-29 | 2019-10-30 | BlackBerry Limited | Assignment and distribution of access credentials to mobile communication devices |
KR101517865B1 (en) | 2010-05-21 | 2015-05-08 | 제너럴 인스트루먼트 코포레이션 | Digital rights management with irregular network access |
KR101064143B1 (en) * | 2010-08-20 | 2011-09-15 | 주식회사 파수닷컴 | System for protecting data stored in clipboard in digital rights management environment and recording medium storing program for executing method of the same in computer |
US8661555B2 (en) * | 2010-11-29 | 2014-02-25 | Sap Ag | Role-based access control over instructions in software code |
GB2500356A (en) | 2011-01-20 | 2013-09-18 | Box Inc | Real time notification of activities that occur in a web-based collaboration environment |
EP2500848A1 (en) | 2011-03-15 | 2012-09-19 | Amadeus S.A.S. | Method and system for centralized reservation context management on multi-server reservation system |
ES2454548T3 (en) | 2011-03-15 | 2014-04-10 | Amadeus S.A.S. | Procedure and system to provide a session in a heterogeneous environment |
EP2500856A1 (en) | 2011-03-15 | 2012-09-19 | Amadeus S.A.S. | Method and system for providing a session involving a plurality of software applications |
WO2012142178A2 (en) | 2011-04-11 | 2012-10-18 | Intertrust Technologies Corporation | Information security systems and methods |
US20120265865A1 (en) * | 2011-04-14 | 2012-10-18 | Ricoh Company, Ltd. | Device management system |
US20120272339A1 (en) * | 2011-04-25 | 2012-10-25 | Ganesan Kumaravel | Method and system for accessing password-protected data on a device |
US9235620B2 (en) | 2012-08-14 | 2016-01-12 | Amadeus S.A.S. | Updating cached database query results |
EP2541473A1 (en) | 2011-06-27 | 2013-01-02 | Amadeus S.A.S. | Method and system for a pre-shopping reservation system with increased search efficiency |
WO2012157792A1 (en) * | 2011-05-16 | 2012-11-22 | Lg Electronics Inc. | Electronic device |
US9015601B2 (en) | 2011-06-21 | 2015-04-21 | Box, Inc. | Batch uploading of content to a web-based collaboration environment |
GB2503625A (en) | 2011-07-08 | 2014-01-01 | Box Inc | Collaboration sessions in a workspace on cloud-based content management system |
EP2729877A4 (en) | 2011-07-08 | 2015-06-17 | Box Inc | Desktop application for access and interaction with workspaces in a cloud-based content management system and synchronization mechanisms thereof |
US20130034229A1 (en) * | 2011-08-05 | 2013-02-07 | Apple Inc. | System and method for wireless data protection |
JP5559276B2 (en) * | 2011-09-20 | 2014-07-23 | 株式会社東芝 | Document distribution system |
US9197718B2 (en) | 2011-09-23 | 2015-11-24 | Box, Inc. | Central management and control of user-contributed content in a web-based collaboration environment and management console thereof |
US8515902B2 (en) | 2011-10-14 | 2013-08-20 | Box, Inc. | Automatic and semi-automatic tagging features of work items in a shared workspace for metadata tracking in a cloud-based content management system with selective or optional user contribution |
WO2013062599A1 (en) | 2011-10-26 | 2013-05-02 | Box, Inc. | Enhanced multimedia content preview rendering in a cloud content management system |
US9098474B2 (en) | 2011-10-26 | 2015-08-04 | Box, Inc. | Preview pre-generation based on heuristics and algorithmic prediction/assessment of predicted user behavior for enhancement of user experience |
WO2013082320A1 (en) | 2011-11-29 | 2013-06-06 | Box, Inc. | Mobile platform file and folder selection functionalities for offline access and synchronization |
US9904435B2 (en) | 2012-01-06 | 2018-02-27 | Box, Inc. | System and method for actionable event generation for task delegation and management via a discussion forum in a web-based collaboration environment |
US11232481B2 (en) | 2012-01-30 | 2022-01-25 | Box, Inc. | Extended applications of multimedia content previews in the cloud-based content management system |
US9965745B2 (en) | 2012-02-24 | 2018-05-08 | Box, Inc. | System and method for promoting enterprise adoption of a web-based collaboration environment |
US9195636B2 (en) | 2012-03-07 | 2015-11-24 | Box, Inc. | Universal file type preview for mobile devices |
JP5966505B2 (en) * | 2012-03-28 | 2016-08-10 | 日本電気株式会社 | Server device, client device, request processing method, server response processing method, request processing program, and response processing program |
US9054919B2 (en) | 2012-04-05 | 2015-06-09 | Box, Inc. | Device pinning capability for enterprise cloud service and storage accounts |
US9575981B2 (en) | 2012-04-11 | 2017-02-21 | Box, Inc. | Cloud service enabled to handle a set of files depicted to a user as a single file in a native operating system |
US9413587B2 (en) | 2012-05-02 | 2016-08-09 | Box, Inc. | System and method for a third-party application to access content within a cloud-based platform |
GB2505272B (en) | 2012-05-04 | 2014-07-09 | Box Inc | Repository redundancy implementation of a system which incrementally updates clients with events that occurred via cloud-enabled platform |
US9691051B2 (en) | 2012-05-21 | 2017-06-27 | Box, Inc. | Security enhancement through application access control |
US8914900B2 (en) | 2012-05-23 | 2014-12-16 | Box, Inc. | Methods, architectures and security mechanisms for a third-party application to access content in a cloud-based platform |
US9712510B2 (en) | 2012-07-06 | 2017-07-18 | Box, Inc. | Systems and methods for securely submitting comments among users via external messaging applications in a cloud-based platform |
US9792320B2 (en) | 2012-07-06 | 2017-10-17 | Box, Inc. | System and method for performing shard migration to support functions of a cloud-based service |
GB2505072A (en) | 2012-07-06 | 2014-02-19 | Box Inc | Identifying users and collaborators as search results in a cloud-based system |
US9237170B2 (en) | 2012-07-19 | 2016-01-12 | Box, Inc. | Data loss prevention (DLP) methods and architectures by a cloud service |
US9794256B2 (en) | 2012-07-30 | 2017-10-17 | Box, Inc. | System and method for advanced control tools for administrators in a cloud-based service |
US9596328B2 (en) * | 2012-08-09 | 2017-03-14 | Oracle International Corporation | Hierarchical criteria-based timeout protocols |
US8745267B2 (en) | 2012-08-19 | 2014-06-03 | Box, Inc. | Enhancement of upload and/or download performance based on client and/or server feedback information |
US9369520B2 (en) | 2012-08-19 | 2016-06-14 | Box, Inc. | Enhancement of upload and/or download performance based on client and/or server feedback information |
GB2513671A (en) | 2012-08-27 | 2014-11-05 | Box Inc | Server side techniques for reducing database workload in implementing selective subfolder synchronization in a cloud-based environment |
US9135462B2 (en) | 2012-08-29 | 2015-09-15 | Box, Inc. | Upload and download streaming encryption to/from a cloud-based platform |
US9311071B2 (en) | 2012-09-06 | 2016-04-12 | Box, Inc. | Force upgrade of a mobile application via a server side configuration file |
US9117087B2 (en) | 2012-09-06 | 2015-08-25 | Box, Inc. | System and method for creating a secure channel for inter-application communication based on intents |
US9195519B2 (en) | 2012-09-06 | 2015-11-24 | Box, Inc. | Disabling the self-referential appearance of a mobile application in an intent via a background registration |
US9292833B2 (en) | 2012-09-14 | 2016-03-22 | Box, Inc. | Batching notifications of activities that occur in a web-based collaboration environment |
US9553758B2 (en) | 2012-09-18 | 2017-01-24 | Box, Inc. | Sandboxing individual applications to specific user folders in a cloud-based service |
US10915492B2 (en) | 2012-09-19 | 2021-02-09 | Box, Inc. | Cloud-based platform enabled with media content indexed for text-based searches and/or metadata extraction |
US9959420B2 (en) | 2012-10-02 | 2018-05-01 | Box, Inc. | System and method for enhanced security and management mechanisms for enterprise administrators in a cloud-based environment |
US9495364B2 (en) | 2012-10-04 | 2016-11-15 | Box, Inc. | Enhanced quick search features, low-barrier commenting/interactive features in a collaboration platform |
US9705967B2 (en) | 2012-10-04 | 2017-07-11 | Box, Inc. | Corporate user discovery and identification of recommended collaborators in a cloud platform |
US9665349B2 (en) | 2012-10-05 | 2017-05-30 | Box, Inc. | System and method for generating embeddable widgets which enable access to a cloud-based collaboration platform |
US9628268B2 (en) * | 2012-10-17 | 2017-04-18 | Box, Inc. | Remote key management in a cloud-based environment |
US9756022B2 (en) | 2014-08-29 | 2017-09-05 | Box, Inc. | Enhanced remote key management for an enterprise in a cloud-based environment |
US10235383B2 (en) | 2012-12-19 | 2019-03-19 | Box, Inc. | Method and apparatus for synchronization of items with read-only permissions in a cloud-based environment |
US9396245B2 (en) | 2013-01-02 | 2016-07-19 | Box, Inc. | Race condition handling in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform |
US8990883B2 (en) * | 2013-01-02 | 2015-03-24 | International Business Machines Corporation | Policy-based development and runtime control of mobile applications |
US9953036B2 (en) | 2013-01-09 | 2018-04-24 | Box, Inc. | File system monitoring in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform |
EP2755151A3 (en) | 2013-01-11 | 2014-09-24 | Box, Inc. | Functionalities, features and user interface of a synchronization client to a cloud-based environment |
EP2757491A1 (en) | 2013-01-17 | 2014-07-23 | Box, Inc. | Conflict resolution, retry condition management, and handling of problem files for the synchronization client to a cloud-based platform |
US9798892B2 (en) | 2013-03-15 | 2017-10-24 | Live Nation Entertainment, Inc. | Prioritized link establishment for data transfer using task scheduling |
US10657278B2 (en) | 2013-03-15 | 2020-05-19 | Live Nation Entertainment, Inc. | Prioritized link establishment for data transfer using task scheduling |
US10846074B2 (en) | 2013-05-10 | 2020-11-24 | Box, Inc. | Identification and handling of items to be ignored for synchronization with a cloud-based platform by a synchronization client |
US10725968B2 (en) | 2013-05-10 | 2020-07-28 | Box, Inc. | Top down delete or unsynchronization on delete of and depiction of item synchronization with a synchronization client to a cloud-based platform |
GB2515192B (en) | 2013-06-13 | 2016-12-14 | Box Inc | Systems and methods for synchronization event building and/or collapsing by a synchronization component of a cloud-based platform |
US9805050B2 (en) | 2013-06-21 | 2017-10-31 | Box, Inc. | Maintaining and updating file system shadows on a local device by a synchronization client of a cloud-based platform |
US10110656B2 (en) | 2013-06-25 | 2018-10-23 | Box, Inc. | Systems and methods for providing shell communication in a cloud-based platform |
US10229134B2 (en) | 2013-06-25 | 2019-03-12 | Box, Inc. | Systems and methods for managing upgrades, migration of user data and improving performance of a cloud-based platform |
US20150026760A1 (en) * | 2013-07-20 | 2015-01-22 | Keith Lipman | System and Method for Policy-Based Confidentiality Management |
US9535924B2 (en) | 2013-07-30 | 2017-01-03 | Box, Inc. | Scalability improvement in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform |
US8892679B1 (en) | 2013-09-13 | 2014-11-18 | Box, Inc. | Mobile device, methods and user interfaces thereof in a mobile device platform featuring multifunctional access and engagement in a collaborative environment provided by a cloud-based platform |
US9213684B2 (en) | 2013-09-13 | 2015-12-15 | Box, Inc. | System and method for rendering document in web browser or mobile device regardless of third-party plug-in software |
US9535909B2 (en) | 2013-09-13 | 2017-01-03 | Box, Inc. | Configurable event-based automation architecture for cloud-based collaboration platforms |
US9704137B2 (en) | 2013-09-13 | 2017-07-11 | Box, Inc. | Simultaneous editing/accessing of content by collaborator invitation through a web-based or mobile application to a cloud-based collaboration platform |
GB2518298A (en) | 2013-09-13 | 2015-03-18 | Box Inc | High-availability architecture for a cloud-based concurrent-access collaboration platform |
US10509527B2 (en) | 2013-09-13 | 2019-12-17 | Box, Inc. | Systems and methods for configuring event-based automation in cloud-based collaboration platforms |
JP6210812B2 (en) * | 2013-09-24 | 2017-10-11 | キヤノン株式会社 | Information processing apparatus, control method therefor, and program |
US10866931B2 (en) | 2013-10-22 | 2020-12-15 | Box, Inc. | Desktop application for accessing a cloud collaboration platform |
US9645708B2 (en) | 2014-02-28 | 2017-05-09 | Konica Minolta Laboratory U.S.A., Inc. | User interface method for modifying a selection list of items to add or remove items while indicating original selection |
US10560439B2 (en) * | 2014-03-27 | 2020-02-11 | Arris Enterprises, Inc. | System and method for device authorization and remediation |
JP2015201030A (en) | 2014-04-08 | 2015-11-12 | 富士通株式会社 | Terminal device, information management server, terminal program, information management program, and system |
US10530854B2 (en) | 2014-05-30 | 2020-01-07 | Box, Inc. | Synchronization of permissioned content in cloud-based environments |
US9846701B2 (en) * | 2014-06-03 | 2017-12-19 | Varonis Systems, Ltd. | Policies for objects collaborations |
US9602514B2 (en) | 2014-06-16 | 2017-03-21 | Box, Inc. | Enterprise mobility management and verification of a managed application by a content provider |
US10038731B2 (en) | 2014-08-29 | 2018-07-31 | Box, Inc. | Managing flow-based interactions with cloud-based shared content |
US10574442B2 (en) * | 2014-08-29 | 2020-02-25 | Box, Inc. | Enhanced remote key management for an enterprise in a cloud-based environment |
US9894119B2 (en) | 2014-08-29 | 2018-02-13 | Box, Inc. | Configurable metadata-based automation and content classification architecture for cloud-based collaboration platforms |
JP6458925B2 (en) * | 2014-09-11 | 2019-01-30 | 富士ゼロックス株式会社 | Image processing apparatus and image processing program |
US9317526B1 (en) * | 2014-11-11 | 2016-04-19 | Sap Se | Data protection compliant version control |
US10560440B2 (en) | 2015-03-12 | 2020-02-11 | Fornetix Llc | Server-client PKI for applied key management system and process |
US10630686B2 (en) | 2015-03-12 | 2020-04-21 | Fornetix Llc | Systems and methods for organizing devices in a policy hierarchy |
US10965459B2 (en) | 2015-03-13 | 2021-03-30 | Fornetix Llc | Server-client key escrow for applied key management system and process |
US10079833B2 (en) * | 2015-03-30 | 2018-09-18 | Konica Minolta Laboratory U.S.A., Inc. | Digital rights management system with confirmation notification to document publisher during document protection and distribution |
US10521402B2 (en) * | 2015-07-02 | 2019-12-31 | Charles Nicholls | System, method, and apparatus for data management with shallow copy functionality |
US10931653B2 (en) * | 2016-02-26 | 2021-02-23 | Fornetix Llc | System and method for hierarchy manipulation in an encryption key management system |
US9516473B1 (en) * | 2016-04-04 | 2016-12-06 | Ricoh Company, Ltd. | Device management based on tracking path taken by user |
US10650152B2 (en) * | 2016-06-09 | 2020-05-12 | Blackberry Limited | Data access control based on storage validation |
US10454769B2 (en) | 2016-10-06 | 2019-10-22 | Cisco Technology, Inc. | Method and system for synchronizing policy in a control plane |
KR101986690B1 (en) * | 2017-02-28 | 2019-06-10 | 네이버 주식회사 | Key chain management method and key chain management system for end-to-end encryption of message |
US10616228B2 (en) * | 2017-11-10 | 2020-04-07 | Adobe Inc. | Enhanced permissions for enabling re-purposing of resources while maintaining integrity |
US11209997B2 (en) * | 2017-11-22 | 2021-12-28 | Blackberry Limited | Method and system for low latency data management |
US10831670B2 (en) | 2017-11-22 | 2020-11-10 | Blackberry Limited | Method and system for low latency data management |
GB2568744A (en) * | 2017-11-27 | 2019-05-29 | Cambridge Consultants | Apparatus and methods for virtual asset management |
US11681781B2 (en) * | 2018-02-21 | 2023-06-20 | Comcast Cable Communications, Llc | Systems and methods for content security |
US11057434B2 (en) * | 2018-12-05 | 2021-07-06 | International Business Machines Corporation | High performance access control |
FR3090154B1 (en) * | 2018-12-18 | 2021-11-19 | Looker Data Sciences Inc | SECURING DATA AT REST USING THE TRANSPORTABILITY OF COMPUTER SERVER NETWORK PROVIDER SERVICE AGNOSTIC ENCRYPTED DATA |
CN113378184A (en) * | 2020-02-25 | 2021-09-10 | 伊姆西Ip控股有限责任公司 | Method, apparatus and computer program product for data protection |
US11151229B1 (en) | 2020-04-10 | 2021-10-19 | Avila Technology, LLC | Secure messaging service with digital rights management using blockchain technology |
US10873852B1 (en) | 2020-04-10 | 2020-12-22 | Avila Technology, LLC | POOFster: a secure mobile text message and object sharing application, system, and method for same |
US11757642B1 (en) * | 2022-07-18 | 2023-09-12 | Spideroak, Inc. | Systems and methods for decentralized synchronization and braided conflict resolution |
Citations (51)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5335346A (en) | 1989-05-15 | 1994-08-02 | International Business Machines Corporation | Access control policies for an object oriented database, including access control lists which span across object boundaries |
US5432851A (en) | 1993-10-21 | 1995-07-11 | Tecsec Incorporated | Personal computer access control system |
US5513260A (en) | 1994-06-29 | 1996-04-30 | Macrovision Corporation | Method and apparatus for copy protection for various recording media |
US5629980A (en) | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
US5634012A (en) | 1994-11-23 | 1997-05-27 | Xerox Corporation | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US5638443A (en) | 1994-11-23 | 1997-06-10 | Xerox Corporation | System for controlling the distribution and use of composite digital works |
US5715403A (en) | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
US5729734A (en) | 1995-11-03 | 1998-03-17 | Apple Computer, Inc. | File privilege administration apparatus and methods |
US5748736A (en) | 1996-06-14 | 1998-05-05 | Mittra; Suvo | System and method for secure group communications via multicast or broadcast |
WO1999001815A1 (en) | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5910987A (en) | 1995-02-13 | 1999-06-08 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5920861A (en) | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
WO1999048296A1 (en) | 1998-03-16 | 1999-09-23 | Intertrust Technologies Corporation | Methods and apparatus for continuous control and protection of media content |
US6006332A (en) * | 1996-10-21 | 1999-12-21 | Case Western Reserve University | Rights management system for digital media |
US6115819A (en) | 1994-05-26 | 2000-09-05 | The Commonwealth Of Australia | Secure computer architecture |
US6157721A (en) | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
WO2001006374A2 (en) | 1999-07-16 | 2001-01-25 | Intertrust Technologies Corp. | System and method for securing an untrusted storage |
US6188766B1 (en) | 1997-03-05 | 2001-02-13 | Cryptography Research, Inc. | Apparatus and method for confirming, timestamping, and archiving printer and telecopier transmissions |
US6249866B1 (en) | 1997-09-16 | 2001-06-19 | Microsoft Corporation | Encrypting file system and method |
US6278783B1 (en) | 1998-06-03 | 2001-08-21 | Cryptography Research, Inc. | Des and other cryptographic, processes with leak minimization for smartcards and other cryptosystems |
US6289455B1 (en) | 1999-09-02 | 2001-09-11 | Crypotography Research, Inc. | Method and apparatus for preventing piracy of digital content |
US6298442B1 (en) | 1998-06-03 | 2001-10-02 | Cryptography Research, Inc. | Secure modular exponentiation with leak minimization for smartcards and other cryptosystems |
US20010026618A1 (en) | 1996-08-12 | 2001-10-04 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US6304658B1 (en) | 1998-01-02 | 2001-10-16 | Cryptography Research, Inc. | Leak-resistant cryptographic method and apparatus |
US6327661B1 (en) | 1998-06-03 | 2001-12-04 | Cryptography Research, Inc. | Using unpredictable information to minimize leakage from smartcards and other cryptosystems |
US20020032873A1 (en) | 2000-09-14 | 2002-03-14 | Lordemann David A. | Method and system for protecting objects distributed over a network |
US20020048369A1 (en) | 1995-02-13 | 2002-04-25 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US20020071553A1 (en) | 2000-10-20 | 2002-06-13 | Taizo Shirai | Data storage device, data recording method, data playback method, and program providing medium |
US20020099947A1 (en) | 2001-01-19 | 2002-07-25 | Xerox Corporation | Secure content objects |
US6449721B1 (en) | 1999-05-28 | 2002-09-10 | Authentica Security Technologies, Inc. | Method of encrypting information for remote access while maintaining access control |
US20020136410A1 (en) | 2001-03-26 | 2002-09-26 | Sun Microsystems, Inc. | Method and apparatus for extinguishing ephemeral keys |
US20020141582A1 (en) | 2001-03-28 | 2002-10-03 | Kocher Paul C. | Content security layer providing long-term renewable security |
US20020147906A1 (en) | 2001-01-26 | 2002-10-10 | International Business Machines Corporation | Method for broadcast encryption and key revocation of stateless receivers |
US20020150245A1 (en) | 2001-04-11 | 2002-10-17 | Hiroshi Sugimoto | Recording/reproducing apparatus, data moving method, and data deletion method |
US20020178377A1 (en) | 2001-03-21 | 2002-11-28 | International Business Machines Corporation | Method and system for server support for pluggable authorization systems |
US20020178271A1 (en) * | 2000-11-20 | 2002-11-28 | Graham Todd D. | Dynamic file access control and management |
US20020188869A1 (en) | 2001-06-11 | 2002-12-12 | Paul Patrick | System and method for server security and entitlement processing |
US20020191797A1 (en) | 2001-06-13 | 2002-12-19 | Sun Microsystems, Inc. | Secure ephemeral decryptability |
US20030023856A1 (en) | 2001-06-13 | 2003-01-30 | Intertrust Technologies Corporation | Software self-checking systems and methods |
US20030046244A1 (en) | 1997-11-06 | 2003-03-06 | Intertrust Technologies Corp. | Methods for matching, selecting, and/or classifying based on rights management and/or other information |
US20030051172A1 (en) | 2001-09-13 | 2003-03-13 | Lordemann David A. | Method and system for protecting digital objects distributed over a network |
US20030070072A1 (en) | 2001-10-09 | 2003-04-10 | Nick Nassiri | System and method of identity and signature and document authentication using a video conference |
US6571254B1 (en) | 1998-03-06 | 2003-05-27 | International Business Machines Corporation | Method and apparatus for accessing an object, and storage medium storing a program for controlling access to an object |
US20030110397A1 (en) * | 2001-12-12 | 2003-06-12 | Pervasive Security Systems, Inc. | Guaranteed delivery of changes to security policies in a distributed system |
US20030215095A1 (en) | 2002-05-16 | 2003-11-20 | Nec Corporation | Time shift outputting method and time shift outputting apparatus for contents data |
US20040052379A1 (en) | 2001-10-03 | 2004-03-18 | Yusei Nishimoto | Content transmission apparatus, content reception apparatus, content transmission program, and content reception program |
US6931531B1 (en) | 1998-09-02 | 2005-08-16 | Matsushita Electric Industrial Co., Ltd. | Image object recording, compression, and encryption method and system |
US7082536B2 (en) | 2000-11-13 | 2006-07-25 | Globalcerts, Lc | System and method for computerized global messaging encryption |
US7130829B2 (en) * | 2001-06-29 | 2006-10-31 | International Business Machines Corporation | Digital rights management |
US7239709B1 (en) | 1998-01-26 | 2007-07-03 | Matsushita Electric Industrial Co., Ltd. | Data recording/reproducing method, data recording/reproducing system, recording apparatus |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09146843A (en) * | 1995-11-20 | 1997-06-06 | Fujitsu Ltd | Information processor |
JPH10111833A (en) * | 1996-10-07 | 1998-04-28 | Hitachi Ltd | Access right management system |
JP3216607B2 (en) * | 1998-07-29 | 2001-10-09 | 日本電気株式会社 | Digital work distribution system and method, digital work reproduction apparatus and method, and recording medium |
US6466932B1 (en) * | 1998-08-14 | 2002-10-15 | Microsoft Corporation | System and method for implementing group policy |
WO2000019326A1 (en) * | 1998-09-29 | 2000-04-06 | Fujitsu Limited | Method and device for access request processing |
JP3471654B2 (en) * | 1999-04-06 | 2003-12-02 | 富士通株式会社 | License server, copyright holder system, user system, system, recording medium, and content use control method |
JP2000293584A (en) * | 1999-04-09 | 2000-10-20 | Nec Software Chugoku Ltd | Contents distribution system and method for managing contract |
JP2002007914A (en) * | 2000-06-16 | 2002-01-11 | Nec Corp | Electronic content opening method, electronic content rental method, and device for realizing rental |
JP2002207739A (en) * | 2001-01-12 | 2002-07-26 | Ns Solutions Corp | Document management system |
JP3927376B2 (en) * | 2001-03-27 | 2007-06-06 | 日立ソフトウエアエンジニアリング株式会社 | Data export prohibition program |
US20020178119A1 (en) * | 2001-05-24 | 2002-11-28 | International Business Machines Corporation | Method and system for a role-based access control model with active roles |
JP2003006027A (en) * | 2001-06-21 | 2003-01-10 | Hitachi Ltd | Method for automatically setting access control policy and its system |
US20030037263A1 (en) * | 2001-08-08 | 2003-02-20 | Trivium Systems Inc. | Dynamic rules-based secure data access system for business computer platforms |
-
2004
- 2004-05-27 JP JP2006515002A patent/JP4759513B2/en not_active Expired - Fee Related
- 2004-05-27 EP EP04753643A patent/EP1629382A4/en not_active Withdrawn
- 2004-05-27 CA CA002527668A patent/CA2527668A1/en not_active Abandoned
- 2004-05-27 WO PCT/US2004/016848 patent/WO2004109443A2/en active Application Filing
- 2004-05-28 US US10/856,112 patent/US7587749B2/en active Active
- 2004-06-01 US US10/858,827 patent/US20050008163A1/en not_active Abandoned
-
2011
- 2011-01-12 JP JP2011003824A patent/JP2011081842A/en active Pending
Patent Citations (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5335346A (en) | 1989-05-15 | 1994-08-02 | International Business Machines Corporation | Access control policies for an object oriented database, including access control lists which span across object boundaries |
US5432851A (en) | 1993-10-21 | 1995-07-11 | Tecsec Incorporated | Personal computer access control system |
US6115819A (en) | 1994-05-26 | 2000-09-05 | The Commonwealth Of Australia | Secure computer architecture |
US5513260A (en) | 1994-06-29 | 1996-04-30 | Macrovision Corporation | Method and apparatus for copy protection for various recording media |
US5638443A (en) | 1994-11-23 | 1997-06-10 | Xerox Corporation | System for controlling the distribution and use of composite digital works |
US5715403A (en) | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
US5634012A (en) | 1994-11-23 | 1997-05-27 | Xerox Corporation | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US5629980A (en) | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
US6427140B1 (en) | 1995-02-13 | 2002-07-30 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US20010042043A1 (en) | 1995-02-13 | 2001-11-15 | Intertrust Technologies Corp. | Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances |
US6185683B1 (en) | 1995-02-13 | 2001-02-06 | Intertrust Technologies Corp. | Trusted and secure techniques, systems and methods for item delivery and execution |
US5910987A (en) | 1995-02-13 | 1999-06-08 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US20020048369A1 (en) | 1995-02-13 | 2002-04-25 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US20020112171A1 (en) | 1995-02-13 | 2002-08-15 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5729734A (en) | 1995-11-03 | 1998-03-17 | Apple Computer, Inc. | File privilege administration apparatus and methods |
US5748736A (en) | 1996-06-14 | 1998-05-05 | Mittra; Suvo | System and method for secure group communications via multicast or broadcast |
US20030041239A1 (en) | 1996-08-12 | 2003-02-27 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US6157721A (en) | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US20030002673A1 (en) | 1996-08-12 | 2003-01-02 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US20020023214A1 (en) | 1996-08-12 | 2002-02-21 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US20010026618A1 (en) | 1996-08-12 | 2001-10-04 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6006332A (en) * | 1996-10-21 | 1999-12-21 | Case Western Reserve University | Rights management system for digital media |
US6138119A (en) | 1997-02-25 | 2000-10-24 | Intertrust Technologies Corp. | Techniques for defining, using and manipulating rights management data structures |
US5920861A (en) | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
US6188766B1 (en) | 1997-03-05 | 2001-02-13 | Cryptography Research, Inc. | Apparatus and method for confirming, timestamping, and archiving printer and telecopier transmissions |
WO1999001815A1 (en) | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
US6249866B1 (en) | 1997-09-16 | 2001-06-19 | Microsoft Corporation | Encrypting file system and method |
US20030046244A1 (en) | 1997-11-06 | 2003-03-06 | Intertrust Technologies Corp. | Methods for matching, selecting, and/or classifying based on rights management and/or other information |
US6381699B2 (en) | 1998-01-02 | 2002-04-30 | Cryptography Research, Inc. | Leak-resistant cryptographic method and apparatus |
US6304658B1 (en) | 1998-01-02 | 2001-10-16 | Cryptography Research, Inc. | Leak-resistant cryptographic method and apparatus |
US7239709B1 (en) | 1998-01-26 | 2007-07-03 | Matsushita Electric Industrial Co., Ltd. | Data recording/reproducing method, data recording/reproducing system, recording apparatus |
US6571254B1 (en) | 1998-03-06 | 2003-05-27 | International Business Machines Corporation | Method and apparatus for accessing an object, and storage medium storing a program for controlling access to an object |
WO1999048296A1 (en) | 1998-03-16 | 1999-09-23 | Intertrust Technologies Corporation | Methods and apparatus for continuous control and protection of media content |
US6278783B1 (en) | 1998-06-03 | 2001-08-21 | Cryptography Research, Inc. | Des and other cryptographic, processes with leak minimization for smartcards and other cryptosystems |
US6327661B1 (en) | 1998-06-03 | 2001-12-04 | Cryptography Research, Inc. | Using unpredictable information to minimize leakage from smartcards and other cryptosystems |
US6298442B1 (en) | 1998-06-03 | 2001-10-02 | Cryptography Research, Inc. | Secure modular exponentiation with leak minimization for smartcards and other cryptosystems |
US6931531B1 (en) | 1998-09-02 | 2005-08-16 | Matsushita Electric Industrial Co., Ltd. | Image object recording, compression, and encryption method and system |
US6449721B1 (en) | 1999-05-28 | 2002-09-10 | Authentica Security Technologies, Inc. | Method of encrypting information for remote access while maintaining access control |
WO2001006374A2 (en) | 1999-07-16 | 2001-01-25 | Intertrust Technologies Corp. | System and method for securing an untrusted storage |
US6289455B1 (en) | 1999-09-02 | 2001-09-11 | Crypotography Research, Inc. | Method and apparatus for preventing piracy of digital content |
US20020032873A1 (en) | 2000-09-14 | 2002-03-14 | Lordemann David A. | Method and system for protecting objects distributed over a network |
US20020071553A1 (en) | 2000-10-20 | 2002-06-13 | Taizo Shirai | Data storage device, data recording method, data playback method, and program providing medium |
US7082536B2 (en) | 2000-11-13 | 2006-07-25 | Globalcerts, Lc | System and method for computerized global messaging encryption |
US20020178271A1 (en) * | 2000-11-20 | 2002-11-28 | Graham Todd D. | Dynamic file access control and management |
US20020099947A1 (en) | 2001-01-19 | 2002-07-25 | Xerox Corporation | Secure content objects |
US20020147906A1 (en) | 2001-01-26 | 2002-10-10 | International Business Machines Corporation | Method for broadcast encryption and key revocation of stateless receivers |
US20020178377A1 (en) | 2001-03-21 | 2002-11-28 | International Business Machines Corporation | Method and system for server support for pluggable authorization systems |
US20020136410A1 (en) | 2001-03-26 | 2002-09-26 | Sun Microsystems, Inc. | Method and apparatus for extinguishing ephemeral keys |
US20020141582A1 (en) | 2001-03-28 | 2002-10-03 | Kocher Paul C. | Content security layer providing long-term renewable security |
US20020150245A1 (en) | 2001-04-11 | 2002-10-17 | Hiroshi Sugimoto | Recording/reproducing apparatus, data moving method, and data deletion method |
US20020188869A1 (en) | 2001-06-11 | 2002-12-12 | Paul Patrick | System and method for server security and entitlement processing |
US20030023856A1 (en) | 2001-06-13 | 2003-01-30 | Intertrust Technologies Corporation | Software self-checking systems and methods |
US20020191797A1 (en) | 2001-06-13 | 2002-12-19 | Sun Microsystems, Inc. | Secure ephemeral decryptability |
US7130829B2 (en) * | 2001-06-29 | 2006-10-31 | International Business Machines Corporation | Digital rights management |
US20030051172A1 (en) | 2001-09-13 | 2003-03-13 | Lordemann David A. | Method and system for protecting digital objects distributed over a network |
US20040052379A1 (en) | 2001-10-03 | 2004-03-18 | Yusei Nishimoto | Content transmission apparatus, content reception apparatus, content transmission program, and content reception program |
US20030070072A1 (en) | 2001-10-09 | 2003-04-10 | Nick Nassiri | System and method of identity and signature and document authentication using a video conference |
US20030110397A1 (en) * | 2001-12-12 | 2003-06-12 | Pervasive Security Systems, Inc. | Guaranteed delivery of changes to security policies in a distributed system |
US20030215095A1 (en) | 2002-05-16 | 2003-11-20 | Nec Corporation | Time shift outputting method and time shift outputting apparatus for contents data |
Non-Patent Citations (1)
Title |
---|
Microsoft(R) Computer Dictionary, Fifth Edition Excerpt: Fkeys-flash ROM http://proquest.safaribooksonline.com/0735614954/ch07 Pub Date: May 1, 2002. * |
Cited By (223)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8924428B2 (en) | 2001-11-23 | 2014-12-30 | Commvault Systems, Inc. | Systems and methods of media management, such as management of media to and from a media storage library |
US20120259858A1 (en) * | 2002-11-18 | 2012-10-11 | Fairchild Grainville R | Method and apparatus providing omnibus view of online and offline content of various file types and sources |
US8725769B2 (en) * | 2002-11-18 | 2014-05-13 | Mercury Kingdom Assets Limited | Method and apparatus providing omnibus view of online and offline content of various file types and sources |
US9589034B2 (en) | 2002-11-18 | 2017-03-07 | Mercury Kingdom Assets Limited | Method and apparatus providing omnibus view of online and offline content of various file types and sources |
US8463753B2 (en) | 2003-04-03 | 2013-06-11 | Commvault Systems, Inc. | System and method for extended media retention |
US9201917B2 (en) | 2003-04-03 | 2015-12-01 | Commvault Systems, Inc. | Systems and methods for performing storage operations in a computer network |
US10162712B2 (en) | 2003-04-03 | 2018-12-25 | Commvault Systems, Inc. | System and method for extended media retention |
US9251190B2 (en) | 2003-04-03 | 2016-02-02 | Commvault Systems, Inc. | System and method for sharing media in a computer network |
US8209293B2 (en) | 2003-04-03 | 2012-06-26 | Commvault Systems, Inc. | System and method for extended media retention |
US9940043B2 (en) | 2003-04-03 | 2018-04-10 | Commvault Systems, Inc. | Systems and methods for performing storage operations in a computer network |
US9507525B2 (en) | 2004-11-05 | 2016-11-29 | Commvault Systems, Inc. | Methods and system of pooling storage devices |
US10191675B2 (en) | 2004-11-05 | 2019-01-29 | Commvault Systems, Inc. | Methods and system of pooling secondary storage devices |
US8463994B2 (en) | 2005-12-19 | 2013-06-11 | Commvault Systems, Inc. | System and method for improved media identification in a storage device |
US8230171B2 (en) | 2005-12-19 | 2012-07-24 | Commvault Systems, Inc. | System and method for improved media identification in a storage device |
US9298895B2 (en) * | 2005-12-29 | 2016-03-29 | Nextlabs, Inc. | Preventing conflicts of interests between two or more groups using applications |
US10380363B2 (en) | 2005-12-29 | 2019-08-13 | Nextlabs, Inc. | Preventing conflicts of interests between two or more groups using applications |
US20140310423A1 (en) * | 2005-12-29 | 2014-10-16 | Nextlabs, Inc. | Preventing Conflicts of Interests Between Two or More Groups Using Applications |
US8886902B1 (en) | 2006-02-02 | 2014-11-11 | Emc Corporation | Disk backup set access |
US8341127B1 (en) * | 2006-02-02 | 2012-12-25 | Emc Corporation | Client initiated restore |
US20070294699A1 (en) * | 2006-06-16 | 2007-12-20 | Microsoft Corporation | Conditionally reserving resources in an operating system |
US20080059941A1 (en) * | 2006-08-30 | 2008-03-06 | Timothy Payne | Method and system for supporting a collaborative development environment |
US20080072074A1 (en) * | 2006-09-19 | 2008-03-20 | Fujitsu Limited | Information-protection device, information-protection system, information-protection method, and program-storage medium storing information protection program |
US8886853B2 (en) | 2006-09-22 | 2014-11-11 | Commvault Systems, Inc. | Systems and methods for uniquely identifying removable media by its manufacturing defects wherein defects includes bad memory or redundant cells or both |
US8539118B2 (en) | 2006-09-22 | 2013-09-17 | Commvault Systems, Inc. | Systems and methods of media management, such as management of media to and from a media storage library, including removable media |
US8656068B2 (en) | 2006-09-22 | 2014-02-18 | Commvault Systems, Inc. | Systems and methods of media management, such as management of media to and from a media storage library, including removable media |
US20080109911A1 (en) * | 2006-11-03 | 2008-05-08 | Microsoft Corporation | Send/Lend Business Rights |
US8346734B2 (en) | 2006-12-22 | 2013-01-01 | Commvault Systems, Inc. | Systems and methods of media management, such as management of media to and from a media storage library |
US8756203B2 (en) | 2006-12-22 | 2014-06-17 | Commvault Systems, Inc. | Systems and methods of media management, such as management of media to and from a media storage library |
US8832031B2 (en) | 2006-12-22 | 2014-09-09 | Commvault Systems, Inc. | Systems and methods of hierarchical storage management, such as global management of storage operations |
US8341182B2 (en) | 2006-12-22 | 2012-12-25 | Commvault Systems, Inc. | Systems and methods of media management, such as management of media to and from a media storage library |
US8484165B2 (en) | 2006-12-22 | 2013-07-09 | Commvault Systems, Inc. | Systems and methods of media management, such as management of media to and from a media storage library |
US8402000B2 (en) | 2006-12-22 | 2013-03-19 | Commvault Systems, Inc. | Systems and methods of media management, such as management of media to and from a media storage library |
US8346733B2 (en) | 2006-12-22 | 2013-01-01 | Commvault Systems, Inc. | Systems and methods of media management, such as management of media to and from a media storage library |
US20090038005A1 (en) * | 2007-07-31 | 2009-02-05 | Cisco Technology, Inc. | Privilege-based access system |
US8996823B2 (en) | 2007-08-30 | 2015-03-31 | Commvault Systems, Inc. | Parallel access virtual tape library and drives |
US8706976B2 (en) | 2007-08-30 | 2014-04-22 | Commvault Systems, Inc. | Parallel access virtual tape library and drives |
US7706289B2 (en) * | 2007-12-30 | 2010-04-27 | Oracle America, Inc. | System and method for validating packet classification |
US20090168657A1 (en) * | 2007-12-30 | 2009-07-02 | Rahoul Puri | System and Method for Validating Packet Classification |
US10547678B2 (en) | 2008-09-15 | 2020-01-28 | Commvault Systems, Inc. | Data transfer techniques within data storage devices, such as network attached storage performing data migration |
US20110022516A1 (en) * | 2009-07-25 | 2011-01-27 | Hong Gao | Multiple Payments at One Click |
US20110219424A1 (en) * | 2010-03-05 | 2011-09-08 | Microsoft Corporation | Information protection using zones |
US20110219081A1 (en) * | 2010-03-08 | 2011-09-08 | Microsoft Corporation | Zone classification of electronic mail messages |
US9838349B2 (en) | 2010-03-08 | 2017-12-05 | Microsoft Technology Licensing, Llc | Zone classification of electronic mail messages |
US10983870B2 (en) | 2010-09-30 | 2021-04-20 | Commvault Systems, Inc. | Data recovery operations, such as recovery from modified network data management protocol data |
US9557929B2 (en) | 2010-09-30 | 2017-01-31 | Commvault Systems, Inc. | Data recovery operations, such as recovery from modified network data management protocol data |
US11640338B2 (en) | 2010-09-30 | 2023-05-02 | Commvault Systems, Inc. | Data recovery operations, such as recovery from modified network data management protocol data |
US9244779B2 (en) | 2010-09-30 | 2016-01-26 | Commvault Systems, Inc. | Data recovery operations, such as recovery from modified network data management protocol data |
US10275318B2 (en) | 2010-09-30 | 2019-04-30 | Commvault Systems, Inc. | Data recovery operations, such as recovery from modified network data management protocol data |
US9251097B1 (en) * | 2011-03-22 | 2016-02-02 | Amazon Technologies, Inc. | Redundant key management |
WO2012148654A1 (en) * | 2011-04-29 | 2012-11-01 | Siemens Product Lifecycle Management Software Inc. | Object-based models in document management |
US20120278277A1 (en) * | 2011-04-29 | 2012-11-01 | Siemens Product Lifecycle Management Software Inc. | Object-based models in document management |
US9767298B2 (en) * | 2012-01-12 | 2017-09-19 | Sony Corporation | Information storage device, information processing system, information processing method, and program |
US20140351585A1 (en) * | 2012-01-12 | 2014-11-27 | Sony Corporation | Information storage device, information processing system, information processing method, and program |
US10318542B2 (en) | 2012-03-30 | 2019-06-11 | Commvault Systems, Inc. | Information management of mobile device data |
US9529871B2 (en) | 2012-03-30 | 2016-12-27 | Commvault Systems, Inc. | Information management of mobile device data |
US20160154963A1 (en) * | 2012-08-08 | 2016-06-02 | Amazon Technologies, Inc. | Redundant key management |
US20180157853A1 (en) * | 2012-08-08 | 2018-06-07 | Amazon Technologies, Inc. | Redundant key management |
US10936729B2 (en) * | 2012-08-08 | 2021-03-02 | Amazon Technologies, Inc. | Redundant key management |
US9904788B2 (en) * | 2012-08-08 | 2018-02-27 | Amazon Technologies, Inc. | Redundant key management |
US9069799B2 (en) | 2012-12-27 | 2015-06-30 | Commvault Systems, Inc. | Restoration of centralized data storage manager, such as data storage manager in a hierarchical data storage system |
US10303559B2 (en) | 2012-12-27 | 2019-05-28 | Commvault Systems, Inc. | Restoration of centralized data storage manager, such as data storage manager in a hierarchical data storage system |
US11243849B2 (en) | 2012-12-27 | 2022-02-08 | Commvault Systems, Inc. | Restoration of centralized data storage manager, such as data storage manager in a hierarchical data storage system |
US9928144B2 (en) | 2015-03-30 | 2018-03-27 | Commvault Systems, Inc. | Storage management of data using an open-archive architecture, including streamlined access to primary data originally stored on network-attached storage and archived to secondary storage |
US11500730B2 (en) | 2015-03-30 | 2022-11-15 | Commvault Systems, Inc. | Storage management of data using an open-archive architecture, including streamlined access to primary data originally stored on network-attached storage and archived to secondary storage |
US10733058B2 (en) | 2015-03-30 | 2020-08-04 | Commvault Systems, Inc. | Storage management of data using an open-archive architecture, including streamlined access to primary data originally stored on network-attached storage and archived to secondary storage |
US10318157B2 (en) | 2015-09-02 | 2019-06-11 | Commvault Systems, Inc. | Migrating data to disk without interrupting running operations |
US10747436B2 (en) | 2015-09-02 | 2020-08-18 | Commvault Systems, Inc. | Migrating data to disk without interrupting running operations |
US10101913B2 (en) | 2015-09-02 | 2018-10-16 | Commvault Systems, Inc. | Migrating data to disk without interrupting running backup operations |
US11157171B2 (en) | 2015-09-02 | 2021-10-26 | Commvault Systems, Inc. | Migrating data to disk without interrupting running operations |
US11244367B2 (en) | 2016-04-01 | 2022-02-08 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US11651402B2 (en) | 2016-04-01 | 2023-05-16 | OneTrust, LLC | Data processing systems and communication systems and methods for the efficient generation of risk assessments |
US11004125B2 (en) | 2016-04-01 | 2021-05-11 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US11157600B2 (en) | 2016-06-10 | 2021-10-26 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11544667B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US10997315B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11025675B2 (en) | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11023842B2 (en) | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US11023616B2 (en) | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11030274B2 (en) | 2016-06-10 | 2021-06-08 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11030563B2 (en) | 2016-06-10 | 2021-06-08 | OneTrust, LLC | Privacy management systems and methods |
US11030327B2 (en) | 2016-06-10 | 2021-06-08 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11036882B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US11036674B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US11038925B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11036771B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11057356B2 (en) | 2016-06-10 | 2021-07-06 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US11062051B2 (en) | 2016-06-10 | 2021-07-13 | OneTrust, LLC | Consent receipt management systems and related methods |
US11068618B2 (en) | 2016-06-10 | 2021-07-20 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US11070593B2 (en) * | 2016-06-10 | 2021-07-20 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11074367B2 (en) | 2016-06-10 | 2021-07-27 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11087260B2 (en) | 2016-06-10 | 2021-08-10 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US11100444B2 (en) | 2016-06-10 | 2021-08-24 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US11100445B2 (en) | 2016-06-10 | 2021-08-24 | OneTrust, LLC | Data processing systems for assessing readiness for responding to privacy-related incidents |
US11113416B2 (en) | 2016-06-10 | 2021-09-07 | OneTrust, LLC | Application privacy scanning systems and related methods |
US11122011B2 (en) | 2016-06-10 | 2021-09-14 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US11120162B2 (en) | 2016-06-10 | 2021-09-14 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11120161B2 (en) | 2016-06-10 | 2021-09-14 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11126748B2 (en) | 2016-06-10 | 2021-09-21 | OneTrust, LLC | Data processing consent management systems and related methods |
US11134086B2 (en) | 2016-06-10 | 2021-09-28 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US11138299B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11138336B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11138242B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11138318B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US11921894B2 (en) | 2016-06-10 | 2024-03-05 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
US11146566B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11144622B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Privacy management systems and methods |
US11144670B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US11151233B2 (en) | 2016-06-10 | 2021-10-19 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11868507B2 (en) | 2016-06-10 | 2024-01-09 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US11847182B2 (en) | 2016-06-10 | 2023-12-19 | OneTrust, LLC | Data processing consent capture systems and related methods |
US10997542B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Privacy management systems and methods |
US11727141B2 (en) | 2016-06-10 | 2023-08-15 | OneTrust, LLC | Data processing systems and methods for synching privacy-related user consent across multiple computing devices |
US11182501B2 (en) | 2016-06-10 | 2021-11-23 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11188615B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11188862B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Privacy management systems and methods |
US11195134B2 (en) | 2016-06-10 | 2021-12-07 | OneTrust, LLC | Privacy management systems and methods |
US11200341B2 (en) | 2016-06-10 | 2021-12-14 | OneTrust, LLC | Consent receipt management systems and related methods |
US11210420B2 (en) | 2016-06-10 | 2021-12-28 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11222142B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems for validating authorization for personal data collection, storage, and processing |
US11222139B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems and methods for automatic discovery and assessment of mobile software development kits |
US11222309B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11227247B2 (en) | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US11228620B2 (en) | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11238390B2 (en) | 2016-06-10 | 2022-02-01 | OneTrust, LLC | Privacy management systems and methods |
US11240273B2 (en) | 2016-06-10 | 2022-02-01 | OneTrust, LLC | Data processing and scanning systems for generating and populating a data inventory |
US11675929B2 (en) | 2016-06-10 | 2023-06-13 | OneTrust, LLC | Data processing consent sharing systems and related methods |
US11651104B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11244071B2 (en) | 2016-06-10 | 2022-02-08 | OneTrust, LLC | Data processing systems for use in automatically generating, populating, and submitting data subject access requests |
US11244072B2 (en) | 2016-06-10 | 2022-02-08 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11256777B2 (en) | 2016-06-10 | 2022-02-22 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11277448B2 (en) | 2016-06-10 | 2022-03-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11294939B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11295316B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11301589B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Consent receipt management systems and related methods |
US11301796B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US11308435B2 (en) | 2016-06-10 | 2022-04-19 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11328240B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for assessing readiness for responding to privacy-related incidents |
US11328092B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US11334681B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Application privacy scanning systems and related meihods |
US11334682B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11336697B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11343284B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11341447B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Privacy management systems and methods |
US11347889B2 (en) | 2016-06-10 | 2022-05-31 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11354434B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11354435B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11361057B2 (en) | 2016-06-10 | 2022-06-14 | OneTrust, LLC | Consent receipt management systems and related methods |
US11366909B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11366786B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US11651106B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11392720B2 (en) | 2016-06-10 | 2022-07-19 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11645353B2 (en) | 2016-06-10 | 2023-05-09 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11403377B2 (en) | 2016-06-10 | 2022-08-02 | OneTrust, LLC | Privacy management systems and methods |
US11409908B2 (en) | 2016-06-10 | 2022-08-09 | OneTrust, LLC | Data processing systems and methods for populating and maintaining a centralized database of personal data |
US11416636B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing consent management systems and related methods |
US11416634B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11416590B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11418492B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US11416798B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US11416589B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11418516B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US11416576B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11416109B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US11645418B2 (en) | 2016-06-10 | 2023-05-09 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11438386B2 (en) | 2016-06-10 | 2022-09-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11636171B2 (en) | 2016-06-10 | 2023-04-25 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11625502B2 (en) | 2016-06-10 | 2023-04-11 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US11609939B2 (en) | 2016-06-10 | 2023-03-21 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11449633B2 (en) | 2016-06-10 | 2022-09-20 | OneTrust, LLC | Data processing systems and methods for automatic discovery and assessment of mobile software development kits |
US11461500B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US11461722B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Questionnaire response automation for compliance management |
US11468196B2 (en) | 2016-06-10 | 2022-10-11 | OneTrust, LLC | Data processing systems for validating authorization for personal data collection, storage, and processing |
US11468386B2 (en) | 2016-06-10 | 2022-10-11 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US11475136B2 (en) | 2016-06-10 | 2022-10-18 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US11586762B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for auditing data request compliance |
US11481710B2 (en) | 2016-06-10 | 2022-10-25 | OneTrust, LLC | Privacy management systems and methods |
US11488085B2 (en) | 2016-06-10 | 2022-11-01 | OneTrust, LLC | Questionnaire response automation for compliance management |
US11586700B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US11562097B2 (en) | 2016-06-10 | 2023-01-24 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US11520928B2 (en) | 2016-06-10 | 2022-12-06 | OneTrust, LLC | Data processing systems for generating personal data receipts and related methods |
US11558429B2 (en) | 2016-06-10 | 2023-01-17 | OneTrust, LLC | Data processing and scanning systems for generating and populating a data inventory |
US11556672B2 (en) | 2016-06-10 | 2023-01-17 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11551174B2 (en) | 2016-06-10 | 2023-01-10 | OneTrust, LLC | Privacy management systems and methods |
US11550897B2 (en) | 2016-06-10 | 2023-01-10 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11544405B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US10997318B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
US20220277272A1 (en) * | 2016-12-08 | 2022-09-01 | Airwatch Llc | Secured attachment management |
US11663359B2 (en) | 2017-06-16 | 2023-05-30 | OneTrust, LLC | Data processing systems for identifying whether cookies contain personally identifying information |
US11373007B2 (en) | 2017-06-16 | 2022-06-28 | OneTrust, LLC | Data processing systems for identifying whether cookies contain personally identifying information |
RU2658894C1 (en) * | 2017-07-26 | 2018-06-25 | Открытое Акционерное Общество "Информационные Технологии И Коммуникационные Системы" | Method of the data access control with the users accounts protection |
US10601907B2 (en) * | 2017-09-22 | 2020-03-24 | Artiste QB Net Inc. | System and method for platform to securely distribute compute workload to web capable devices |
US20190171731A1 (en) * | 2017-12-06 | 2019-06-06 | International Business Machines Corporation | Code Management System |
US11157460B2 (en) * | 2017-12-06 | 2021-10-26 | International Business Machines Corporation | Code management system |
CN111344691A (en) * | 2017-12-06 | 2020-06-26 | 国际商业机器公司 | Code management system |
US10742735B2 (en) | 2017-12-12 | 2020-08-11 | Commvault Systems, Inc. | Enhanced network attached storage (NAS) services interfacing to cloud storage |
US11575747B2 (en) | 2017-12-12 | 2023-02-07 | Commvault Systems, Inc. | Enhanced network attached storage (NAS) services interfacing to cloud storage |
US20210110053A1 (en) * | 2018-04-19 | 2021-04-15 | Murata Machinery, Ltd. | Exclusive control system and exclusive control method |
US11947708B2 (en) | 2018-09-07 | 2024-04-02 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11144675B2 (en) | 2018-09-07 | 2021-10-12 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11157654B2 (en) | 2018-09-07 | 2021-10-26 | OneTrust, LLC | Data processing systems for orphaned data identification and deletion and related methods |
US11544409B2 (en) | 2018-09-07 | 2023-01-03 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11593523B2 (en) | 2018-09-07 | 2023-02-28 | OneTrust, LLC | Data processing systems for orphaned data identification and deletion and related methods |
US11797528B2 (en) | 2020-07-08 | 2023-10-24 | OneTrust, LLC | Systems and methods for targeted data discovery |
US11444976B2 (en) | 2020-07-28 | 2022-09-13 | OneTrust, LLC | Systems and methods for automatically blocking the use of tracking tools |
US11475165B2 (en) | 2020-08-06 | 2022-10-18 | OneTrust, LLC | Data processing systems and methods for automatically redacting unstructured data from a data subject access request |
US11704440B2 (en) | 2020-09-15 | 2023-07-18 | OneTrust, LLC | Data processing systems and methods for preventing execution of an action documenting a consent rejection |
US11436373B2 (en) | 2020-09-15 | 2022-09-06 | OneTrust, LLC | Data processing systems and methods for detecting tools for the automatic blocking of consent requests |
US11526624B2 (en) | 2020-09-21 | 2022-12-13 | OneTrust, LLC | Data processing systems and methods for automatically detecting target data transfers and target data processing |
US11397819B2 (en) | 2020-11-06 | 2022-07-26 | OneTrust, LLC | Systems and methods for identifying data processing activities based on data discovery results |
US11615192B2 (en) | 2020-11-06 | 2023-03-28 | OneTrust, LLC | Systems and methods for identifying data processing activities based on data discovery results |
US11687528B2 (en) | 2021-01-25 | 2023-06-27 | OneTrust, LLC | Systems and methods for discovery, classification, and indexing of data in a native computing system |
US11442906B2 (en) | 2021-02-04 | 2022-09-13 | OneTrust, LLC | Managing custom attributes for domain objects defined within microservices |
US11494515B2 (en) | 2021-02-08 | 2022-11-08 | OneTrust, LLC | Data processing systems and methods for anonymizing data samples in classification analysis |
US11601464B2 (en) | 2021-02-10 | 2023-03-07 | OneTrust, LLC | Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system |
US11775348B2 (en) | 2021-02-17 | 2023-10-03 | OneTrust, LLC | Managing custom workflows for domain objects defined within microservices |
US11546661B2 (en) | 2021-02-18 | 2023-01-03 | OneTrust, LLC | Selective redaction of media content |
US11533315B2 (en) | 2021-03-08 | 2022-12-20 | OneTrust, LLC | Data transfer discovery and analysis systems and related methods |
US11562078B2 (en) | 2021-04-16 | 2023-01-24 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
US11816224B2 (en) | 2021-04-16 | 2023-11-14 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
US11593223B1 (en) | 2021-09-02 | 2023-02-28 | Commvault Systems, Inc. | Using resource pool administrative entities in a data storage management system to provide shared infrastructure to tenants |
US11928031B2 (en) | 2021-09-02 | 2024-03-12 | Commvault Systems, Inc. | Using resource pool administrative entities to provide shared infrastructure to tenants |
US11620142B1 (en) | 2022-06-03 | 2023-04-04 | OneTrust, LLC | Generating and customizing user interfaces for demonstrating functions of interactive user environments |
US11960564B2 (en) | 2023-02-02 | 2024-04-16 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
Also Published As
Publication number | Publication date |
---|---|
CA2527668A1 (en) | 2004-12-16 |
WO2004109443A2 (en) | 2004-12-16 |
EP1629382A2 (en) | 2006-03-01 |
JP2011081842A (en) | 2011-04-21 |
JP2006526851A (en) | 2006-11-24 |
US20050008163A1 (en) | 2005-01-13 |
EP1629382A4 (en) | 2011-12-21 |
WO2004109443A3 (en) | 2005-06-16 |
JP4759513B2 (en) | 2011-08-31 |
US20050028006A1 (en) | 2005-02-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7587749B2 (en) | Computer method and apparatus for managing data objects in a distributed context | |
US6141754A (en) | Integrated method and system for controlling information access and distribution | |
JP4575721B2 (en) | Security container for document components | |
US7913311B2 (en) | Methods and systems for providing access control to electronic data | |
US20050114672A1 (en) | Data rights management of digital information in a portable software permission wrapper | |
US8543827B2 (en) | Methods and systems for providing access control to secured data | |
US8464354B2 (en) | Content cryptographic firewall system | |
US8458273B2 (en) | Content rights management for document contents and systems, structures, and methods therefor | |
US7512798B2 (en) | Organization-based content rights management and systems, structures, and methods therefor | |
US20090319786A1 (en) | Electronic data security system and method | |
US7392547B2 (en) | Organization-based content rights management and systems, structures, and methods therefor | |
US20020077986A1 (en) | Controlling and managing digital assets | |
US20050273600A1 (en) | Method and system for file data access within a secure environment | |
US20030200459A1 (en) | Method and system for protecting documents while maintaining their editability | |
US20170118214A1 (en) | Method and architecture for providing access to secured data from non-secured clients | |
KR20010088917A (en) | Method of protecting digital information and system thereof | |
JP2004046856A (en) | Method for obtaining digital license corresponding to digital content | |
JP2003228520A (en) | Method and system for offline access to secured electronic data | |
US20040268137A1 (en) | Organization-based content rights management and systems, structures, and methods therefor | |
US9292661B2 (en) | System and method for distributing rights-protected content | |
KR20000000410A (en) | System and method for security management on distributed PC | |
EP1410629A1 (en) | System and method for receiving and storing a transport stream | |
Ito et al. | Group cipher system for intranet security | |
KR20100013890A (en) | Administrative data backup system for distributed data sources | |
Weippl | Coimbra: secure Web access to multimedia content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: LIQUID MACHINES, INC., MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LESTER, NORBERT;KYNE, FAJEN;MORGAN, ROBERT;AND OTHERS;REEL/FRAME:015231/0918;SIGNING DATES FROM 20040707 TO 20040902 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
CC | Certificate of correction | ||
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |